Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.34.212.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.34.212.141.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020073100 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 01 07:50:24 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 141.212.34.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.212.34.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.214.198.36 attack
May 23 14:51:56 XXX sshd[22083]: Invalid user admin from 85.214.198.36 port 45576
2020-05-24 00:28:33
141.101.69.42 attackbots
As always with cloudfare
2020-05-24 00:29:38
66.42.102.227 attack
xmlrpc attack
2020-05-24 00:31:13
176.113.83.222 attackbots
Invalid user calandra from 176.113.83.222 port 47700
2020-05-24 00:24:49
159.65.86.239 attack
May 23 17:26:21 vserver sshd\[26988\]: Invalid user lsd from 159.65.86.239May 23 17:26:23 vserver sshd\[26988\]: Failed password for invalid user lsd from 159.65.86.239 port 44732 ssh2May 23 17:33:49 vserver sshd\[27019\]: Invalid user jne from 159.65.86.239May 23 17:33:51 vserver sshd\[27019\]: Failed password for invalid user jne from 159.65.86.239 port 37596 ssh2
...
2020-05-24 00:17:13
167.99.225.183 attackbotsspam
Port 22 Scan, PTR: None
2020-05-24 00:39:40
116.228.37.90 attackspambots
Invalid user ejv from 116.228.37.90 port 44844
2020-05-24 00:43:24
219.136.239.10 attackbots
Invalid user xcb from 219.136.239.10 port 51624
2020-05-24 00:32:12
77.40.123.115 attackbotsspam
Invalid user kyw from 77.40.123.115 port 58862
2020-05-24 00:46:19
150.109.41.62 attack
odoo8
...
2020-05-24 00:41:06
213.103.132.207 attack
Invalid user pi from 213.103.132.207 port 34559
2020-05-24 00:34:17
195.70.59.121 attack
May 23 19:16:30 ift sshd\[65156\]: Invalid user cmhealth from 195.70.59.121May 23 19:16:33 ift sshd\[65156\]: Failed password for invalid user cmhealth from 195.70.59.121 port 40072 ssh2May 23 19:20:14 ift sshd\[407\]: Invalid user zxx from 195.70.59.121May 23 19:20:16 ift sshd\[407\]: Failed password for invalid user zxx from 195.70.59.121 port 55128 ssh2May 23 19:23:58 ift sshd\[837\]: Invalid user syd from 195.70.59.121
...
2020-05-24 00:35:41
49.235.240.105 attack
May 23 14:49:34 lnxmysql61 sshd[30132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.105
2020-05-24 00:48:49
213.195.122.247 attackspambots
Invalid user fengcong from 213.195.122.247 port 44318
2020-05-24 00:23:40
118.168.96.145 attackbotsspam
May 23 22:14:27 webhost01 sshd[19238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.168.96.145
May 23 22:14:29 webhost01 sshd[19238]: Failed password for invalid user nagios from 118.168.96.145 port 6817 ssh2
...
2020-05-24 00:43:04

Recently Reported IPs

98.213.95.68 83.213.183.8 46.185.195.111 188.24.155.156
72.0.209.140 200.127.156.44 114.221.30.126 113.78.252.213
133.232.246.219 173.140.161.189 222.213.122.57 178.195.143.33
114.79.164.131 41.121.18.118 105.140.207.144 152.2.17.125
100.32.188.123 186.118.163.5 237.149.17.185 168.125.246.144