AbuseIPDB » 141.98.81.141

Check an IP Address, Domain Name, or Subnet

e.g. 3.235.101.50, microsoft.com, or 5.188.10.0/24

141.98.81.141 was found in our database!

This IP was reported 1139 times. Confidence of Abuse is 100%: ?

100%
ISP FlyServers S.A.
Usage Type Data Center/Web Hosting/Transit
Domain Name flyservers.com
Country Netherlands
City Amsterdam, Noord-Holland

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 141.98.81.141:

This IP address has been reported a total of 1139 times from 15 distinct sources. 141.98.81.141 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T22:13:02Z
Brute-Force SSH
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 22 proto: tcp cat: Misc Attackbytes: 74
SSH
ChillScanner
<SOCKS> TCP (SYN) 141.98.81.141:37204 -> port 1080, len 60
Port Scan
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T21:33:18Z
Brute-Force SSH
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T20:23:10Z
Brute-Force SSH
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "user" at 2020-09-25T19:24:37Z
Brute-Force SSH
ChillScanner
<SOCKS> TCP (SYN) 141.98.81.141:45618 -> port 1080, len 60
Port Scan
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T18:22:11Z
Brute-Force SSH
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T17:41:22Z
Brute-Force SSH
ChillScanner
<SOCKS> TCP (SYN) 141.98.81.141:51141 -> port 1080, len 60
Port Scan
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T16:24:37Z
Brute-Force SSH
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 22 proto: tcp cat: Misc Attackbytes: 74
SSH
legitssl
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T15:44:18Z
Brute-Force SSH
sofie.petschek.com
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-25T15:08:08Z
Brute-Force SSH
ChillScanner
<SOCKS> TCP (SYN) 141.98.81.141:65313 -> port 1080, len 60
Port Scan

Showing 1 to 15 of 1139 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/141.98.81.141