Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.8.195.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.8.195.27.			IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:17:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
27.195.8.141.in-addr.arpa domain name pointer gullveig.from.sh.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.195.8.141.in-addr.arpa	name = gullveig.from.sh.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.36.168.80 attackbots
Jun 12 13:03:20 vps687878 sshd\[29767\]: Invalid user ts from 116.36.168.80 port 37738
Jun 12 13:03:20 vps687878 sshd\[29767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80
Jun 12 13:03:22 vps687878 sshd\[29767\]: Failed password for invalid user ts from 116.36.168.80 port 37738 ssh2
Jun 12 13:06:16 vps687878 sshd\[30257\]: Invalid user admin from 116.36.168.80 port 34210
Jun 12 13:06:16 vps687878 sshd\[30257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.36.168.80
...
2020-06-12 19:14:10
103.3.226.230 attack
Invalid user ssh from 103.3.226.230 port 40784
2020-06-12 19:00:28
103.224.185.48 attackspambots
Brute force attempt
2020-06-12 18:32:12
49.82.229.119 attackbotsspam
Email rejected due to spam filtering
2020-06-12 18:38:26
220.149.242.9 attackbots
Jun 12 07:21:21 lukav-desktop sshd\[9935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.242.9  user=root
Jun 12 07:21:23 lukav-desktop sshd\[9935\]: Failed password for root from 220.149.242.9 port 55622 ssh2
Jun 12 07:24:57 lukav-desktop sshd\[9977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.149.242.9  user=root
Jun 12 07:24:59 lukav-desktop sshd\[9977\]: Failed password for root from 220.149.242.9 port 56177 ssh2
Jun 12 07:28:39 lukav-desktop sshd\[10003\]: Invalid user keg from 220.149.242.9
2020-06-12 18:53:16
83.97.20.31 attackbotsspam
Suspicious activity \(400 Bad Request\)
2020-06-12 18:56:28
103.45.190.249 attack
Unauthorized connection attempt detected from IP address 103.45.190.249 to port 1433
2020-06-12 19:12:19
162.243.138.62 attackspam
 TCP (SYN) 162.243.138.62:53506 -> port 445, len 40
2020-06-12 18:48:00
206.189.73.164 attack
reported through recidive - multiple failed attempts(SSH)
2020-06-12 18:42:05
118.25.159.166 attack
Jun 12 02:57:53 dignus sshd[22635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.159.166  user=sshd
Jun 12 02:57:55 dignus sshd[22635]: Failed password for sshd from 118.25.159.166 port 46858 ssh2
Jun 12 03:01:20 dignus sshd[23177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.159.166  user=root
Jun 12 03:01:22 dignus sshd[23177]: Failed password for root from 118.25.159.166 port 55732 ssh2
Jun 12 03:04:38 dignus sshd[23577]: Invalid user cvsroot from 118.25.159.166 port 36384
...
2020-06-12 18:35:29
59.127.243.224 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-06-12 19:09:56
104.248.225.22 attackbots
MYH,DEF GET /2020/wp-login.php
2020-06-12 19:08:18
189.128.53.186 attackbotsspam
Unauthorized connection attempt detected from IP address 189.128.53.186 to port 1433
2020-06-12 18:43:34
120.132.27.238 attackbots
$f2bV_matches
2020-06-12 19:04:37
113.174.236.42 attackbotsspam
Tried our host z.
2020-06-12 18:37:04

Recently Reported IPs

141.8.195.223 141.8.195.205 141.8.195.33 141.8.195.39
141.8.195.65 141.8.195.60 141.8.195.45 141.8.195.82
141.8.196.101 141.8.195.96 141.8.196.15 141.8.196.114
141.8.196.166 141.8.196.54 141.8.196.50 141.8.197.26
141.8.197.6 141.8.197.25 141.8.196.77 141.8.198.139