Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: Chunghwa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.142.41.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.142.41.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400

;; Query time: 196 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 09:13:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
141.41.142.220.in-addr.arpa domain name pointer 220-142-41-141.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.41.142.220.in-addr.arpa	name = 220-142-41-141.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.85 attackbotsspam
8493/tcp 488/tcp 12312/tcp...
[2020-02-29/04-30]92pkt,86pt.(tcp)
2020-05-01 06:19:54
162.243.164.246 attack
prod11
...
2020-05-01 06:05:08
94.200.86.70 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-01 06:15:21
23.95.128.53 attackspambots
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to outtenchiropractic.com?

The price is just $67 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/amazonbacklink

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner.

Kind Regards,
Claudia
2020-05-01 05:52:04
177.126.135.129 attack
roubou minha conta do fortnite
2020-05-01 06:01:38
180.76.183.59 attackspam
2020-04-30T22:50:58.558573vps773228.ovh.net sshd[13331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.183.59
2020-04-30T22:50:58.550512vps773228.ovh.net sshd[13331]: Invalid user bodhi from 180.76.183.59 port 59956
2020-04-30T22:51:00.180369vps773228.ovh.net sshd[13331]: Failed password for invalid user bodhi from 180.76.183.59 port 59956 ssh2
2020-04-30T22:54:23.802526vps773228.ovh.net sshd[13375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.183.59  user=root
2020-04-30T22:54:25.569577vps773228.ovh.net sshd[13375]: Failed password for root from 180.76.183.59 port 55554 ssh2
...
2020-05-01 05:53:38
134.175.190.226 attackbots
Apr 30 22:42:56 Ubuntu-1404-trusty-64-minimal sshd\[11695\]: Invalid user thanks from 134.175.190.226
Apr 30 22:42:56 Ubuntu-1404-trusty-64-minimal sshd\[11695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.190.226
Apr 30 22:42:59 Ubuntu-1404-trusty-64-minimal sshd\[11695\]: Failed password for invalid user thanks from 134.175.190.226 port 44792 ssh2
Apr 30 22:54:04 Ubuntu-1404-trusty-64-minimal sshd\[19506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.190.226  user=root
Apr 30 22:54:05 Ubuntu-1404-trusty-64-minimal sshd\[19506\]: Failed password for root from 134.175.190.226 port 49934 ssh2
2020-05-01 06:08:27
49.88.112.75 attackbotsspam
May  1 02:57:23 gw1 sshd[31811]: Failed password for root from 49.88.112.75 port 52423 ssh2
...
2020-05-01 06:11:14
198.108.67.89 attack
9108/tcp 8427/tcp 3199/tcp...
[2020-02-29/04-30]100pkt,97pt.(tcp)
2020-05-01 06:24:29
185.173.35.49 attackspambots
3000/tcp 5901/tcp 110/tcp...
[2020-03-03/04-29]49pkt,33pt.(tcp),4pt.(udp)
2020-05-01 06:09:30
212.92.108.64 attackspam
(From dhofmann@dblackagency.com) Thе best wоmеn for sеx in your tоwn UK: https://v.ht/8D0rA
2020-05-01 05:57:55
92.118.161.1 attack
2323/tcp 8000/tcp 8888/tcp...
[2020-02-29/04-30]71pkt,48pt.(tcp),5pt.(udp)
2020-05-01 06:14:22
201.57.40.70 attackbotsspam
SSH Invalid Login
2020-05-01 06:25:26
1.196.223.50 attackbotsspam
Invalid user ubuntu from 1.196.223.50 port 58992
2020-05-01 06:23:18
94.23.212.137 attack
Invalid user matt from 94.23.212.137 port 37399
2020-05-01 06:06:37

Recently Reported IPs

76.24.134.34 71.48.223.121 110.120.125.203 19.72.179.88
15.56.23.254 150.227.56.18 199.149.89.129 173.185.62.215
17.104.91.122 114.247.108.30 10.111.112.24 135.198.147.170
13.154.203.250 132.214.91.242 101.105.177.14 136.205.249.160
136.45.240.157 125.204.249.78 11.161.49.69 36.97.89.58