Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: TIM

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.141.21.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.141.21.242.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052602 1800 900 604800 86400

;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 27 08:21:58 CST 2020
;; MSG SIZE  rcvd: 118
Host info
242.21.141.191.in-addr.arpa domain name pointer 242.21.141.191.isp.timbrasil.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.21.141.191.in-addr.arpa	name = 242.21.141.191.isp.timbrasil.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.215.113.59 attackspambots
Lines containing failures of 14.215.113.59
Oct  4 23:41:21 shared02 sshd[16931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.113.59  user=r.r
Oct  4 23:41:23 shared02 sshd[16931]: Failed password for r.r from 14.215.113.59 port 55560 ssh2
Oct  4 23:41:23 shared02 sshd[16931]: Received disconnect from 14.215.113.59 port 55560:11: Bye Bye [preauth]
Oct  4 23:41:23 shared02 sshd[16931]: Disconnected from authenticating user r.r 14.215.113.59 port 55560 [preauth]
Oct  4 23:58:24 shared02 sshd[22841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.113.59  user=r.r
Oct  4 23:58:26 shared02 sshd[22841]: Failed password for r.r from 14.215.113.59 port 37176 ssh2
Oct  4 23:58:26 shared02 sshd[22841]: Received disconnect from 14.215.113.59 port 37176:11: Bye Bye [preauth]
Oct  4 23:58:26 shared02 sshd[22841]: Disconnected from authenticating user r.r 14.215.113.59 port 37176 [preauth........
------------------------------
2020-10-08 07:42:54
222.186.31.83 attackspam
Oct  8 03:00:07 vps768472 sshd\[3022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Oct  8 03:00:09 vps768472 sshd\[3022\]: Failed password for root from 222.186.31.83 port 13545 ssh2
Oct  8 03:00:11 vps768472 sshd\[3022\]: Failed password for root from 222.186.31.83 port 13545 ssh2
...
2020-10-08 08:17:36
209.141.51.154 attack
4000/udp
[2020-10-07]1pkt
2020-10-08 07:50:56
67.216.193.100 attack
Oct  7 23:47:25 santamaria sshd\[12472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.216.193.100  user=root
Oct  7 23:47:27 santamaria sshd\[12472\]: Failed password for root from 67.216.193.100 port 57100 ssh2
Oct  7 23:49:36 santamaria sshd\[12542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.216.193.100  user=root
...
2020-10-08 08:06:33
51.68.11.195 attackbots
Automatic report - Banned IP Access
2020-10-08 07:53:09
101.231.124.6 attackspambots
Oct  8 02:06:28 ip106 sshd[13022]: Failed password for root from 101.231.124.6 port 27326 ssh2
...
2020-10-08 08:22:17
181.48.172.66 attack
Automatic report - Port Scan Attack
2020-10-08 07:44:56
132.232.1.155 attack
Oct  8 01:12:21 abendstille sshd\[1685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155  user=root
Oct  8 01:12:23 abendstille sshd\[1685\]: Failed password for root from 132.232.1.155 port 52188 ssh2
Oct  8 01:15:31 abendstille sshd\[4766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155  user=root
Oct  8 01:15:33 abendstille sshd\[4766\]: Failed password for root from 132.232.1.155 port 33516 ssh2
Oct  8 01:18:44 abendstille sshd\[7687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155  user=root
...
2020-10-08 07:42:30
85.193.211.134 attackbotsspam
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-08 07:49:26
112.140.185.246 attackspambots
Oct  8 02:14:46 mx sshd[1243029]: Failed password for root from 112.140.185.246 port 47012 ssh2
Oct  8 02:16:01 mx sshd[1243071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.246  user=root
Oct  8 02:16:03 mx sshd[1243071]: Failed password for root from 112.140.185.246 port 56294 ssh2
Oct  8 02:17:14 mx sshd[1243103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.246  user=root
Oct  8 02:17:16 mx sshd[1243103]: Failed password for root from 112.140.185.246 port 36198 ssh2
...
2020-10-08 07:55:25
5.183.255.44 attack
C1,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-08 07:43:21
212.70.149.68 attack
2020-10-07T17:50:14.221745linuxbox-skyline auth[40599]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=pw rhost=212.70.149.68
...
2020-10-08 08:03:32
92.239.13.99 attackbots
Oct  7 22:47:11 pve1 sshd[24575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.239.13.99 
...
2020-10-08 08:04:30
107.173.248.119 attack
Attempt to register Bot detected /wp-login.php
2020-10-08 07:48:01
139.162.77.6 attackspambots
Unauthorised access (Oct  7) SRC=139.162.77.6 LEN=40 TOS=0x10 PREC=0x40 TTL=241 ID=54321 TCP DPT=3389 WINDOW=65535 SYN 
Unauthorised access (Oct  6) SRC=139.162.77.6 LEN=40 TOS=0x10 PREC=0x40 TTL=245 ID=54321 TCP DPT=3389 WINDOW=65535 SYN
2020-10-08 08:14:24

Recently Reported IPs

60.246.0.52 50.28.9.122 134.122.30.143 35.229.235.67
79.147.28.246 62.173.147.215 51.222.32.64 129.204.65.174
113.81.233.97 51.158.30.70 156.96.46.253 188.253.126.105
106.13.231.103 36.232.41.224 82.165.83.15 200.106.53.226
79.22.249.84 14.235.249.161 113.183.233.232 136.232.193.178