Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.12.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.12.16.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:17:21 CST 2022
;; MSG SIZE  rcvd: 104
Host info
16.12.0.141.in-addr.arpa domain name pointer n23-01-12.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.12.0.141.in-addr.arpa	name = n23-01-12.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.61.21.155 attack
Apr  9 15:19:56 lock-38 sshd[782574]: Invalid user research from 182.61.21.155 port 42516
Apr  9 15:19:56 lock-38 sshd[782574]: Failed password for invalid user research from 182.61.21.155 port 42516 ssh2
Apr  9 15:23:20 lock-38 sshd[782692]: Invalid user deploy from 182.61.21.155 port 54674
Apr  9 15:23:20 lock-38 sshd[782692]: Invalid user deploy from 182.61.21.155 port 54674
Apr  9 15:23:20 lock-38 sshd[782692]: Failed password for invalid user deploy from 182.61.21.155 port 54674 ssh2
...
2020-04-10 04:19:10
102.68.17.48 attackbots
Apr  9 14:21:06 localhost sshd[117748]: Invalid user norbert from 102.68.17.48 port 59082
Apr  9 14:21:06 localhost sshd[117748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.17.48
Apr  9 14:21:06 localhost sshd[117748]: Invalid user norbert from 102.68.17.48 port 59082
Apr  9 14:21:08 localhost sshd[117748]: Failed password for invalid user norbert from 102.68.17.48 port 59082 ssh2
Apr  9 14:27:58 localhost sshd[118383]: Invalid user oraprod from 102.68.17.48 port 58402
...
2020-04-10 04:31:58
46.101.204.20 attackspambots
Apr  9 17:46:40 124388 sshd[13533]: Invalid user admin from 46.101.204.20 port 47126
Apr  9 17:46:40 124388 sshd[13533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20
Apr  9 17:46:40 124388 sshd[13533]: Invalid user admin from 46.101.204.20 port 47126
Apr  9 17:46:42 124388 sshd[13533]: Failed password for invalid user admin from 46.101.204.20 port 47126 ssh2
Apr  9 17:51:22 124388 sshd[13684]: Invalid user fofserver from 46.101.204.20 port 55260
2020-04-10 04:37:46
220.78.28.68 attackbotsspam
Apr  9 19:04:54 localhost sshd[17142]: Invalid user thomas from 220.78.28.68 port 24805
Apr  9 19:04:54 localhost sshd[17142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.78.28.68
Apr  9 19:04:54 localhost sshd[17142]: Invalid user thomas from 220.78.28.68 port 24805
Apr  9 19:04:56 localhost sshd[17142]: Failed password for invalid user thomas from 220.78.28.68 port 24805 ssh2
Apr  9 19:08:49 localhost sshd[17558]: Invalid user minecraft from 220.78.28.68 port 38005
...
2020-04-10 03:59:57
34.85.33.91 attackspambots
Automatic report - XMLRPC Attack
2020-04-10 04:05:35
157.245.98.160 attackspambots
prod6
...
2020-04-10 04:39:15
129.226.67.136 attackspambots
Brute-force attempt banned
2020-04-10 04:14:02
202.126.208.122 attackspambots
(sshd) Failed SSH login from 202.126.208.122 (HK/Hong Kong/-): 5 in the last 3600 secs
2020-04-10 04:11:27
202.51.117.211 attackbots
20/4/9@14:10:29: FAIL: Alarm-Network address from=202.51.117.211
20/4/9@14:10:30: FAIL: Alarm-Network address from=202.51.117.211
...
2020-04-10 04:09:18
185.179.83.252 attackspam
B: Abusive ssh attack
2020-04-10 04:38:58
212.92.108.4 attackbots
(From gwenhearns@yahoo.com) Dаting site fоr sех with girls frоm Аustralia: http://rakd.4663.org/287
2020-04-10 04:15:46
67.205.31.136 attackbotsspam
67.205.31.136 - - [09/Apr/2020:17:20:40 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.31.136 - - [09/Apr/2020:17:20:41 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
67.205.31.136 - - [09/Apr/2020:17:20:42 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-10 04:19:23
167.99.74.187 attackbotsspam
k+ssh-bruteforce
2020-04-10 04:32:53
120.26.95.190 attackbotsspam
WordPress wp-login brute force :: 120.26.95.190 0.112 - [09/Apr/2020:16:08:42  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1804 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-04-10 04:16:43
138.197.66.68 attackspam
prod6
...
2020-04-10 04:26:58

Recently Reported IPs

141.0.12.156 141.0.12.158 141.0.12.160 141.0.12.161
141.0.12.162 141.0.12.157 141.0.12.166 141.0.12.167
141.0.12.163 141.0.12.165 141.0.12.168 141.0.12.159
141.0.12.164 118.96.125.88 141.0.12.169 141.0.12.171
141.0.12.170 141.0.12.172 141.0.12.17 141.0.12.173