Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lübeck

Region: Schleswig-Holstein

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Verein zur Foerderung eines Deutschen Forschungsnetzes e.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.83.222.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16274
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;141.83.222.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 02 21:19:33 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 148.222.83.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 148.222.83.141.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
129.204.93.65 attackspambots
2019-12-05 16:07:06,549 fail2ban.actions: WARNING [ssh] Ban 129.204.93.65
2019-12-05 23:59:34
118.89.240.188 attackspam
2019-12-05T17:05:46.596665  sshd[24252]: Invalid user jen from 118.89.240.188 port 39580
2019-12-05T17:05:46.611759  sshd[24252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.240.188
2019-12-05T17:05:46.596665  sshd[24252]: Invalid user jen from 118.89.240.188 port 39580
2019-12-05T17:05:48.422179  sshd[24252]: Failed password for invalid user jen from 118.89.240.188 port 39580 ssh2
2019-12-05T17:12:30.435110  sshd[24336]: Invalid user pass555 from 118.89.240.188 port 34998
...
2019-12-06 00:23:55
36.72.112.4 attackspambots
Wordpress attack
2019-12-05 23:55:52
138.36.22.120 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-12-06 00:10:40
51.254.210.53 attackspambots
Dec  5 16:51:21 vmanager6029 sshd\[23007\]: Invalid user user from 51.254.210.53 port 41134
Dec  5 16:51:21 vmanager6029 sshd\[23007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.210.53
Dec  5 16:51:23 vmanager6029 sshd\[23007\]: Failed password for invalid user user from 51.254.210.53 port 41134 ssh2
2019-12-06 00:35:41
218.92.0.133 attackspambots
$f2bV_matches_ltvn
2019-12-06 00:12:51
92.222.66.234 attackbotsspam
Dec  5 16:42:14 ns41 sshd[22243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.66.234
Dec  5 16:42:14 ns41 sshd[22243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.66.234
2019-12-05 23:57:47
49.88.112.68 attackbots
Dec  5 17:37:29 sauna sshd[109581]: Failed password for root from 49.88.112.68 port 32036 ssh2
Dec  5 17:37:32 sauna sshd[109581]: Failed password for root from 49.88.112.68 port 32036 ssh2
...
2019-12-05 23:54:19
1.186.126.154 attackspam
C1,WP GET /wp-login.php
2019-12-06 00:03:13
49.234.30.33 attack
Dec  5 06:08:52 web1 sshd\[8078\]: Invalid user terminal from 49.234.30.33
Dec  5 06:08:52 web1 sshd\[8078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.33
Dec  5 06:08:54 web1 sshd\[8078\]: Failed password for invalid user terminal from 49.234.30.33 port 34532 ssh2
Dec  5 06:16:10 web1 sshd\[8895\]: Invalid user hrubiak from 49.234.30.33
Dec  5 06:16:10 web1 sshd\[8895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.33
2019-12-06 00:31:28
159.65.158.229 attackbotsspam
Dec  5 06:06:09 hpm sshd\[15018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.229  user=root
Dec  5 06:06:11 hpm sshd\[15018\]: Failed password for root from 159.65.158.229 port 51470 ssh2
Dec  5 06:12:30 hpm sshd\[16029\]: Invalid user jabber from 159.65.158.229
Dec  5 06:12:30 hpm sshd\[16029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.229
Dec  5 06:12:32 hpm sshd\[16029\]: Failed password for invalid user jabber from 159.65.158.229 port 60860 ssh2
2019-12-06 00:27:51
181.126.83.125 attackbots
Dec  5 16:35:42 ns381471 sshd[9956]: Failed password for root from 181.126.83.125 port 33316 ssh2
2019-12-05 23:53:44
106.54.95.232 attackbots
Dec  5 16:21:14 vps647732 sshd[12428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.95.232
Dec  5 16:21:16 vps647732 sshd[12428]: Failed password for invalid user brendac from 106.54.95.232 port 50464 ssh2
...
2019-12-06 00:13:03
136.228.161.66 attackspambots
2019-12-05T15:54:30.575570vps751288.ovh.net sshd\[9329\]: Invalid user burnout from 136.228.161.66 port 56222
2019-12-05T15:54:30.584900vps751288.ovh.net sshd\[9329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
2019-12-05T15:54:32.375330vps751288.ovh.net sshd\[9329\]: Failed password for invalid user burnout from 136.228.161.66 port 56222 ssh2
2019-12-05T16:03:25.713165vps751288.ovh.net sshd\[9448\]: Invalid user cn from 136.228.161.66 port 37392
2019-12-05T16:03:25.723697vps751288.ovh.net sshd\[9448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
2019-12-06 00:06:54
54.39.196.199 attackspambots
Dec  5 10:48:45 ny01 sshd[8207]: Failed password for root from 54.39.196.199 port 42784 ssh2
Dec  5 10:54:37 ny01 sshd[8785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.196.199
Dec  5 10:54:39 ny01 sshd[8785]: Failed password for invalid user delp from 54.39.196.199 port 53318 ssh2
2019-12-05 23:58:41

Recently Reported IPs

183.229.2.78 90.199.237.211 150.136.177.225 94.23.31.18
165.130.13.198 162.24.52.111 67.164.109.165 118.173.31.145
178.125.109.251 178.11.6.83 200.70.39.236 197.232.15.89
208.157.62.160 18.226.26.168 154.160.206.252 96.97.180.26
149.40.3.84 174.136.91.185 122.228.2.134 176.206.139.93