Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
141.8.194.53 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/141.8.194.53/ 
 
 RU - 1H : (75)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN35278 
 
 IP : 141.8.194.53 
 
 CIDR : 141.8.194.0/24 
 
 PREFIX COUNT : 10 
 
 UNIQUE IP COUNT : 4096 
 
 
 ATTACKS DETECTED ASN35278 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-21 23:59:34 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-22 07:18:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.8.194.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56462
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.8.194.164.			IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:38 CST 2022
;; MSG SIZE  rcvd: 106
Host info
164.194.8.141.in-addr.arpa domain name pointer ostara.from.sh.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.194.8.141.in-addr.arpa	name = ostara.from.sh.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.116.163.69 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 17:28:07
60.51.30.140 attack
Virus on IP !
2019-07-10 17:12:57
162.247.74.74 attack
Triggered by Fail2Ban at Ares web server
2019-07-10 17:49:41
67.164.228.251 attackbotsspam
Automatic report - Web App Attack
2019-07-10 17:56:29
223.188.116.81 attack
PHI,WP GET /wp-login.php
2019-07-10 17:14:52
79.11.175.137 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 23:22:34,089 INFO [shellcode_manager] (79.11.175.137) no match, writing hexdump (4fb67eeed8813ebe6c07eacd10f8d183 :2364143) - MS17010 (EternalBlue)
2019-07-10 17:23:06
202.65.151.31 attack
Jul 10 10:57:54 ncomp sshd[28152]: Invalid user desktop from 202.65.151.31
Jul 10 10:57:54 ncomp sshd[28152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.65.151.31
Jul 10 10:57:54 ncomp sshd[28152]: Invalid user desktop from 202.65.151.31
Jul 10 10:57:57 ncomp sshd[28152]: Failed password for invalid user desktop from 202.65.151.31 port 49830 ssh2
2019-07-10 17:43:11
153.36.236.35 attackbotsspam
Jul 10 11:38:24 ubuntu-2gb-nbg1-dc3-1 sshd[23232]: Failed password for root from 153.36.236.35 port 42715 ssh2
Jul 10 11:38:28 ubuntu-2gb-nbg1-dc3-1 sshd[23232]: error: maximum authentication attempts exceeded for root from 153.36.236.35 port 42715 ssh2 [preauth]
...
2019-07-10 17:45:48
168.228.149.142 attackspam
$f2bV_matches
2019-07-10 17:51:57
183.105.56.37 attackspambots
2019-07-10T09:00:03.106920abusebot-5.cloudsearch.cf sshd\[12864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.105.56.37  user=root
2019-07-10 17:04:35
178.128.214.153 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 17:18:58
93.80.2.185 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 23:22:41,014 INFO [shellcode_manager] (93.80.2.185) no match, writing hexdump (9e38ac22cf3770830a8035dae4f331fc :2059796) - MS17010 (EternalBlue)
2019-07-10 17:11:55
201.161.58.41 attackspambots
Jul  8 16:53:12 vpxxxxxxx22308 sshd[27689]: Invalid user ejabberd from 201.161.58.41
Jul  8 16:53:12 vpxxxxxxx22308 sshd[27689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.41
Jul  8 16:53:14 vpxxxxxxx22308 sshd[27689]: Failed password for invalid user ejabberd from 201.161.58.41 port 41810 ssh2
Jul  8 16:55:12 vpxxxxxxx22308 sshd[27920]: Invalid user spark from 201.161.58.41
Jul  8 16:55:12 vpxxxxxxx22308 sshd[27920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.161.58.41

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=201.161.58.41
2019-07-10 16:58:51
138.68.146.186 attackbotsspam
2019-07-10T08:59:25.648223abusebot.cloudsearch.cf sshd\[32025\]: Invalid user dovecot from 138.68.146.186 port 60906
2019-07-10 17:10:40
175.203.95.49 attackbotsspam
2019-07-10T08:59:32.022955abusebot-3.cloudsearch.cf sshd\[16965\]: Invalid user burrelli from 175.203.95.49 port 44888
2019-07-10 17:09:43

Recently Reported IPs

141.8.194.131 141.8.194.159 141.8.194.189 141.8.194.239
141.8.194.2 141.8.194.191 141.8.194.203 141.8.194.242
141.8.194.243 141.8.194.42 141.8.194.54 141.8.194.74
141.8.194.76 141.8.195.124 141.8.194.71 141.8.195.125
141.8.195.133 141.8.195.141 141.8.194.64 141.8.195.218