Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.11.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.11.248.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:16:43 CST 2022
;; MSG SIZE  rcvd: 105
Host info
248.11.0.141.in-addr.arpa domain name pointer global-4-lvs-curry-9.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.11.0.141.in-addr.arpa	name = global-4-lvs-curry-9.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.58.222 attackspambots
Invalid user aria from 162.243.58.222 port 59002
2019-09-01 13:12:42
118.89.247.74 attackspambots
Invalid user elastic from 118.89.247.74 port 47602
2019-09-01 13:20:14
173.239.37.163 attackbots
Sep  1 00:12:12 legacy sshd[11005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.163
Sep  1 00:12:14 legacy sshd[11005]: Failed password for invalid user creative from 173.239.37.163 port 38742 ssh2
Sep  1 00:16:16 legacy sshd[11079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.163
...
2019-09-01 13:05:21
180.127.79.210 attackspam
[Aegis] @ 2019-08-31 22:43:20  0100 -> Sendmail rejected message.
2019-09-01 13:43:32
206.189.119.73 attackbotsspam
Invalid user corentin from 206.189.119.73 port 40822
2019-09-01 13:00:58
182.61.175.71 attackspam
2019-09-01T07:03:31.748019  sshd[12866]: Invalid user ksb from 182.61.175.71 port 40562
2019-09-01T07:03:31.760707  sshd[12866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.175.71
2019-09-01T07:03:31.748019  sshd[12866]: Invalid user ksb from 182.61.175.71 port 40562
2019-09-01T07:03:33.867879  sshd[12866]: Failed password for invalid user ksb from 182.61.175.71 port 40562 ssh2
2019-09-01T07:07:56.742408  sshd[12896]: Invalid user shaun from 182.61.175.71 port 57072
...
2019-09-01 13:45:04
158.132.183.90 attack
Sep  1 01:40:24 localhost sshd\[4130\]: Invalid user pippi from 158.132.183.90 port 57834
Sep  1 01:40:24 localhost sshd\[4130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.132.183.90
Sep  1 01:40:25 localhost sshd\[4130\]: Failed password for invalid user pippi from 158.132.183.90 port 57834 ssh2
2019-09-01 13:01:27
134.209.1.169 attack
Automatic report - Banned IP Access
2019-09-01 13:07:02
42.157.128.188 attackspam
$f2bV_matches
2019-09-01 13:50:23
115.187.37.214 attackspam
Invalid user lpd from 115.187.37.214 port 56942
2019-09-01 13:14:26
164.132.44.25 attackspambots
ssh failed login
2019-09-01 13:22:01
54.38.184.235 attack
Aug 31 23:43:23 dedicated sshd[8101]: Invalid user applmgr from 54.38.184.235 port 53120
2019-09-01 13:50:02
218.92.0.208 attackbots
Sep  1 06:54:00 mail sshd\[14432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
Sep  1 06:54:02 mail sshd\[14432\]: Failed password for root from 218.92.0.208 port 19458 ssh2
Sep  1 06:54:04 mail sshd\[14432\]: Failed password for root from 218.92.0.208 port 19458 ssh2
Sep  1 06:54:07 mail sshd\[14432\]: Failed password for root from 218.92.0.208 port 19458 ssh2
Sep  1 06:55:57 mail sshd\[14790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-09-01 12:59:45
163.172.106.112 attackspambots
[portscan] Port scan
2019-09-01 13:05:47
34.242.132.56 attack
Sep  1 00:51:58 MK-Soft-Root1 sshd\[4194\]: Invalid user invite from 34.242.132.56 port 47388
Sep  1 00:51:58 MK-Soft-Root1 sshd\[4194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.242.132.56
Sep  1 00:52:01 MK-Soft-Root1 sshd\[4194\]: Failed password for invalid user invite from 34.242.132.56 port 47388 ssh2
...
2019-09-01 13:15:32

Recently Reported IPs

141.0.11.24 141.0.11.247 141.0.11.245 141.0.11.249
141.0.11.242 118.96.12.95 141.0.11.240 141.0.11.250
141.0.11.253 141.0.11.251 141.0.11.25 141.0.11.252
118.96.120.218 118.96.120.32 118.96.121.17 118.96.124.224
118.96.124.48 141.0.12.121 141.0.12.120 141.0.12.123