Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.108.75.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.108.75.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 15:50:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
141.75.108.2.in-addr.arpa domain name pointer 2-108-75-141-static.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.75.108.2.in-addr.arpa	name = 2-108-75-141-static.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.38.145.4 attack
2020-04-10 00:00:27 -> 2020-04-10 00:00:57 : [46.38.145.4]:49768 connection denied (globally) - 2 login attempts
2020-04-10 06:09:39
212.81.57.150 attack
SpamScore above: 10.0
2020-04-10 05:34:30
106.12.146.9 attackbotsspam
web-1 [ssh] SSH Attack
2020-04-10 05:47:12
5.39.93.158 attackbots
Apr  9 23:51:23 santamaria sshd\[20668\]: Invalid user uploader from 5.39.93.158
Apr  9 23:51:23 santamaria sshd\[20668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.93.158
Apr  9 23:51:25 santamaria sshd\[20668\]: Failed password for invalid user uploader from 5.39.93.158 port 37876 ssh2
...
2020-04-10 05:57:26
222.186.52.39 attackbotsspam
Apr 10 00:06:44 vmd38886 sshd\[28911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39  user=root
Apr 10 00:06:46 vmd38886 sshd\[28911\]: Failed password for root from 222.186.52.39 port 16367 ssh2
Apr 10 00:06:49 vmd38886 sshd\[28911\]: Failed password for root from 222.186.52.39 port 16367 ssh2
2020-04-10 06:09:58
132.232.110.111 attackbots
Apr  9 17:29:38 localhost sshd[5881]: Invalid user redmine from 132.232.110.111 port 40690
Apr  9 17:29:38 localhost sshd[5881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.110.111
Apr  9 17:29:38 localhost sshd[5881]: Invalid user redmine from 132.232.110.111 port 40690
Apr  9 17:29:40 localhost sshd[5881]: Failed password for invalid user redmine from 132.232.110.111 port 40690 ssh2
Apr  9 17:35:54 localhost sshd[6578]: Invalid user deploy from 132.232.110.111 port 48636
...
2020-04-10 05:48:48
128.199.95.163 attack
frenzy
2020-04-10 05:59:27
54.180.2.216 attack
TCP Port Scanning
2020-04-10 06:05:48
118.70.52.95 attackbots
REQUESTED PAGE: /boaform/admin/formPing
2020-04-10 05:55:56
106.51.80.198 attackbots
Apr  9 23:45:20 lock-38 sshd[799072]: Failed password for invalid user tfc from 106.51.80.198 port 51278 ssh2
Apr  9 23:55:06 lock-38 sshd[799410]: Invalid user user from 106.51.80.198 port 35476
Apr  9 23:55:06 lock-38 sshd[799410]: Invalid user user from 106.51.80.198 port 35476
Apr  9 23:55:06 lock-38 sshd[799410]: Failed password for invalid user user from 106.51.80.198 port 35476 ssh2
Apr  9 23:58:41 lock-38 sshd[799533]: Invalid user speedtest from 106.51.80.198 port 42408
...
2020-04-10 06:07:06
114.118.7.153 attack
k+ssh-bruteforce
2020-04-10 05:41:54
149.210.168.119 attackspam
Apr  9 23:45:54 ns382633 sshd\[8424\]: Invalid user danny from 149.210.168.119 port 49225
Apr  9 23:45:54 ns382633 sshd\[8424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.210.168.119
Apr  9 23:45:55 ns382633 sshd\[8424\]: Failed password for invalid user danny from 149.210.168.119 port 49225 ssh2
Apr  9 23:57:27 ns382633 sshd\[10739\]: Invalid user admin from 149.210.168.119 port 32999
Apr  9 23:57:27 ns382633 sshd\[10739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.210.168.119
2020-04-10 06:01:45
145.239.15.244 attackspambots
[Thu Apr 09 19:55:26.329436 2020] [:error] [pid 21740:tid 140306501166848] [client 145.239.15.244:57096] [client 145.239.15.244] ModSecurity: Access denied with code 403 (phase 2). Operator EQ matched 0 at REQUEST_HEADERS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1224"] [id "920320"] [msg "Missing User Agent Header"] [severity "NOTICE"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/MISSING_HEADER_UA"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/images/Klimatologi/Analisis/03-Analisis_Bulanan/Analisis_Hari_Tanpa_Hujan_Berturut_-_Turut_Maksimum_3_Bulanan_Update_1_Bulan_Sekali/Analisis_Hari_Tanpa_Hujan_Berturut_-_Turut_Maksimum_3_Bulanan_Provinsi_Jawa_Timur_Update_1_Bulan_Sekali/2019/09/Analisis_Bulanan_Har
...
2020-04-10 05:48:28
202.152.45.130 attack
Apr  9 16:33:00 www sshd\[8391\]: Failed password for root from 202.152.45.130 port 52084 ssh2Apr  9 16:36:21 www sshd\[8511\]: Invalid user user from 202.152.45.130Apr  9 16:36:23 www sshd\[8511\]: Failed password for invalid user user from 202.152.45.130 port 42832 ssh2
...
2020-04-10 05:50:29
51.38.185.121 attack
SSH Brute Force
2020-04-10 05:38:30

Recently Reported IPs

59.3.141.107 28.168.68.219 7.227.96.112 70.52.245.158
210.234.43.216 78.172.201.21 40.63.110.119 95.41.179.19
23.53.205.205 18.95.226.239 142.212.209.95 242.5.82.46
178.221.0.154 113.48.225.151 54.23.235.196 6.202.180.158
76.238.67.231 42.169.21.88 202.10.130.123 94.225.152.133