Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.199.141.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.199.141.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 03:01:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 53.141.199.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.141.199.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.135.20.36 attack
$f2bV_matches
2020-04-21 23:01:54
189.47.214.28 attackbotsspam
Invalid user sj from 189.47.214.28 port 47986
2020-04-21 23:08:55
45.230.47.150 attack
Invalid user nexus from 45.230.47.150 port 3593
2020-04-21 22:44:14
89.46.86.65 attackspambots
Apr 21 15:55:31 Enigma sshd[641]: Failed password for invalid user gf from 89.46.86.65 port 46534 ssh2
Apr 21 16:00:21 Enigma sshd[1309]: Invalid user zg from 89.46.86.65 port 60962
Apr 21 16:00:21 Enigma sshd[1309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.86.65
Apr 21 16:00:21 Enigma sshd[1309]: Invalid user zg from 89.46.86.65 port 60962
Apr 21 16:00:23 Enigma sshd[1309]: Failed password for invalid user zg from 89.46.86.65 port 60962 ssh2
2020-04-21 22:31:30
35.224.55.166 attack
Invalid user test from 35.224.55.166 port 33738
2020-04-21 22:49:32
209.65.71.3 attackbotsspam
Invalid user ubuntu from 209.65.71.3 port 45768
2020-04-21 22:59:56
51.15.87.74 attackspambots
Apr 21 15:40:35 pornomens sshd\[4696\]: Invalid user test123 from 51.15.87.74 port 53426
Apr 21 15:40:35 pornomens sshd\[4696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74
Apr 21 15:40:38 pornomens sshd\[4696\]: Failed password for invalid user test123 from 51.15.87.74 port 53426 ssh2
...
2020-04-21 22:42:08
41.44.65.247 attack
Invalid user admin2 from 41.44.65.247 port 56056
2020-04-21 22:47:36
190.210.142.45 attackbots
Invalid user system from 190.210.142.45 port 57431
2020-04-21 23:08:24
187.111.211.14 attack
trying to login to mikrotik from zyxel device
2020-04-21 22:30:12
51.83.40.227 attackspam
Invalid user ubuntu from 51.83.40.227 port 60208
2020-04-21 22:40:12
37.152.183.53 attack
SSH Brute-Force. Ports scanning.
2020-04-21 22:48:25
192.3.139.56 attack
Apr 21 16:16:21 meumeu sshd[27591]: Failed password for root from 192.3.139.56 port 37360 ssh2
Apr 21 16:20:20 meumeu sshd[28232]: Failed password for git from 192.3.139.56 port 50594 ssh2
...
2020-04-21 23:07:27
27.34.16.247 attackbotsspam
Invalid user admin from 27.34.16.247 port 10596
2020-04-21 22:50:57
66.129.114.100 attack
Invalid user intp from 66.129.114.100 port 12808
2020-04-21 22:36:08

Recently Reported IPs

45.35.121.155 214.77.81.27 168.56.88.135 199.146.9.50
127.221.185.137 177.41.144.185 127.32.212.103 91.19.251.195
55.83.201.121 52.96.154.3 131.57.220.159 194.11.100.192
70.183.171.207 44.213.167.28 46.76.241.171 6.134.207.216
61.182.229.99 96.111.61.167 189.219.72.85 48.166.1.132