Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.15.			IN	A

;; AUTHORITY SECTION:
.			192	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
15.13.0.141.in-addr.arpa domain name pointer n26-05-03.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.13.0.141.in-addr.arpa	name = n26-05-03.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.140.52 attackbots
Dec  1 22:37:36 sachi sshd\[9226\]: Invalid user 000 from 106.13.140.52
Dec  1 22:37:36 sachi sshd\[9226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.52
Dec  1 22:37:38 sachi sshd\[9226\]: Failed password for invalid user 000 from 106.13.140.52 port 60786 ssh2
Dec  1 22:44:50 sachi sshd\[10056\]: Invalid user admin from 106.13.140.52
Dec  1 22:44:50 sachi sshd\[10056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.52
2019-12-02 16:45:51
58.56.187.83 attackbots
Dec  2 08:59:48 ns382633 sshd\[12516\]: Invalid user klidies from 58.56.187.83 port 56045
Dec  2 08:59:48 ns382633 sshd\[12516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.187.83
Dec  2 08:59:51 ns382633 sshd\[12516\]: Failed password for invalid user klidies from 58.56.187.83 port 56045 ssh2
Dec  2 09:15:41 ns382633 sshd\[16106\]: Invalid user rudziah from 58.56.187.83 port 54123
Dec  2 09:15:41 ns382633 sshd\[16106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.187.83
2019-12-02 16:51:52
51.77.201.36 attackspam
Dec  2 09:30:02 vps691689 sshd[10773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
Dec  2 09:30:05 vps691689 sshd[10773]: Failed password for invalid user Pool@123 from 51.77.201.36 port 41108 ssh2
...
2019-12-02 16:51:06
51.15.84.255 attackbotsspam
Dec  2 09:44:09 ns382633 sshd\[21478\]: Invalid user aeinstein from 51.15.84.255 port 50778
Dec  2 09:44:09 ns382633 sshd\[21478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255
Dec  2 09:44:12 ns382633 sshd\[21478\]: Failed password for invalid user aeinstein from 51.15.84.255 port 50778 ssh2
Dec  2 09:55:28 ns382633 sshd\[24073\]: Invalid user ftpuser from 51.15.84.255 port 41516
Dec  2 09:55:28 ns382633 sshd\[24073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.84.255
2019-12-02 17:06:02
49.234.233.164 attack
Dec  2 09:34:41 MK-Soft-Root2 sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.233.164 
Dec  2 09:34:43 MK-Soft-Root2 sshd[2869]: Failed password for invalid user duan from 49.234.233.164 port 36330 ssh2
...
2019-12-02 16:40:19
51.91.158.136 attack
Dec  2 09:18:30 legacy sshd[10167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.136
Dec  2 09:18:31 legacy sshd[10167]: Failed password for invalid user amstest from 51.91.158.136 port 51120 ssh2
Dec  2 09:24:11 legacy sshd[10492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.136
...
2019-12-02 16:39:58
116.236.85.130 attackspam
2019-12-02T08:32:46.036621vps751288.ovh.net sshd\[29544\]: Invalid user backup from 116.236.85.130 port 36484
2019-12-02T08:32:46.048089vps751288.ovh.net sshd\[29544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.85.130
2019-12-02T08:32:48.320519vps751288.ovh.net sshd\[29544\]: Failed password for invalid user backup from 116.236.85.130 port 36484 ssh2
2019-12-02T08:39:43.596104vps751288.ovh.net sshd\[29589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.85.130  user=root
2019-12-02T08:39:45.447160vps751288.ovh.net sshd\[29589\]: Failed password for root from 116.236.85.130 port 46824 ssh2
2019-12-02 16:52:29
92.249.143.33 attack
Dec  2 09:40:45 microserver sshd[55239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33  user=root
Dec  2 09:40:47 microserver sshd[55239]: Failed password for root from 92.249.143.33 port 48089 ssh2
Dec  2 09:46:52 microserver sshd[56114]: Invalid user buch from 92.249.143.33 port 53847
Dec  2 09:46:52 microserver sshd[56114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33
Dec  2 09:46:54 microserver sshd[56114]: Failed password for invalid user buch from 92.249.143.33 port 53847 ssh2
Dec  2 09:58:45 microserver sshd[57871]: Invalid user guest from 92.249.143.33 port 37108
Dec  2 09:58:45 microserver sshd[57871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.249.143.33
Dec  2 09:58:46 microserver sshd[57871]: Failed password for invalid user guest from 92.249.143.33 port 37108 ssh2
Dec  2 10:04:46 microserver sshd[58745]: pam_unix(sshd:auth): authenticatio
2019-12-02 16:43:25
178.128.72.80 attack
Dec  2 09:55:38 vps647732 sshd[18518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.72.80
Dec  2 09:55:40 vps647732 sshd[18518]: Failed password for invalid user guest from 178.128.72.80 port 43654 ssh2
...
2019-12-02 16:57:03
89.36.216.125 attack
Dec  1 22:42:59 sachi sshd\[9876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125  user=root
Dec  1 22:43:01 sachi sshd\[9876\]: Failed password for root from 89.36.216.125 port 44746 ssh2
Dec  1 22:50:42 sachi sshd\[10580\]: Invalid user lesli from 89.36.216.125
Dec  1 22:50:42 sachi sshd\[10580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.216.125
Dec  1 22:50:44 sachi sshd\[10580\]: Failed password for invalid user lesli from 89.36.216.125 port 57694 ssh2
2019-12-02 16:54:40
159.89.194.103 attackbots
Dec  1 20:22:14 hpm sshd\[23612\]: Invalid user phil from 159.89.194.103
Dec  1 20:22:14 hpm sshd\[23612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103
Dec  1 20:22:16 hpm sshd\[23612\]: Failed password for invalid user phil from 159.89.194.103 port 34488 ssh2
Dec  1 20:28:51 hpm sshd\[24264\]: Invalid user juhani from 159.89.194.103
Dec  1 20:28:51 hpm sshd\[24264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103
2019-12-02 16:29:58
138.197.5.191 attackspam
Dec  1 22:49:55 tdfoods sshd\[21027\]: Invalid user manchini from 138.197.5.191
Dec  1 22:49:55 tdfoods sshd\[21027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
Dec  1 22:49:57 tdfoods sshd\[21027\]: Failed password for invalid user manchini from 138.197.5.191 port 57184 ssh2
Dec  1 22:55:35 tdfoods sshd\[21676\]: Invalid user gdm from 138.197.5.191
Dec  1 22:55:35 tdfoods sshd\[21676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
2019-12-02 16:59:52
198.211.110.133 attackspambots
2019-12-02T08:55:25.970819abusebot-5.cloudsearch.cf sshd\[27205\]: Invalid user den from 198.211.110.133 port 33898
2019-12-02 17:07:16
218.173.42.105 attackspam
Unauthorised access (Dec  2) SRC=218.173.42.105 LEN=40 TTL=44 ID=18355 TCP DPT=23 WINDOW=16048 SYN
2019-12-02 16:28:03
195.145.229.154 attackspam
Dec  2 03:36:03 sshd: Connection from 195.145.229.154 port 58867
Dec  2 03:36:04 sshd: Invalid user yoshihito from 195.145.229.154
Dec  2 03:36:04 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.145.229.154
Dec  2 03:36:06 sshd: Failed password for invalid user yoshihito from 195.145.229.154 port 58867 ssh2
Dec  2 03:36:06 sshd: Received disconnect from 195.145.229.154: 11: Bye Bye [preauth]
2019-12-02 16:46:31

Recently Reported IPs

141.0.13.148 141.0.13.142 141.0.13.149 141.0.13.152
141.0.13.153 141.0.13.151 141.0.13.154 141.0.13.156
141.0.13.158 141.0.13.159 141.0.13.16 141.0.13.160
141.0.13.155 141.0.13.157 141.0.13.161 141.0.13.163
141.0.13.164 141.0.13.162 141.0.13.165 141.0.13.166