Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.159.			IN	A

;; AUTHORITY SECTION:
.			269	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:18 CST 2022
;; MSG SIZE  rcvd: 105
Host info
159.13.0.141.in-addr.arpa domain name pointer n28-05-03.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.13.0.141.in-addr.arpa	name = n28-05-03.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.187.116.190 attack
detected by Fail2Ban
2020-04-18 19:17:15
61.157.91.159 attackspam
Apr 18 05:45:35 xeon sshd[34431]: Failed password for invalid user uw from 61.157.91.159 port 49059 ssh2
2020-04-18 19:13:48
42.242.95.164 attackbots
firewall-block, port(s): 37215/tcp
2020-04-18 19:19:47
118.24.40.136 attack
Apr 18 07:43:45 sip sshd[13541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.40.136
Apr 18 07:43:47 sip sshd[13541]: Failed password for invalid user xq from 118.24.40.136 port 39428 ssh2
Apr 18 08:01:48 sip sshd[20222]: Failed password for root from 118.24.40.136 port 40348 ssh2
2020-04-18 19:32:32
221.228.72.222 attackspambots
Apr 18 09:31:28 shared-1 sshd\[22823\]: Invalid user nexus from 221.228.72.222Apr 18 09:32:45 shared-1 sshd\[22864\]: Invalid user system from 221.228.72.222
...
2020-04-18 19:27:51
119.29.235.171 attackspambots
Apr 18 11:26:13 vps sshd[648869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.235.171  user=root
Apr 18 11:26:15 vps sshd[648869]: Failed password for root from 119.29.235.171 port 12705 ssh2
Apr 18 11:29:10 vps sshd[661757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.235.171  user=root
Apr 18 11:29:12 vps sshd[661757]: Failed password for root from 119.29.235.171 port 54011 ssh2
Apr 18 11:32:03 vps sshd[678254]: Invalid user admin from 119.29.235.171 port 31320
...
2020-04-18 19:12:20
49.235.87.98 attack
no
2020-04-18 19:25:52
195.181.168.170 attackspam
Unauthorized connection attempt detected, IP banned.
2020-04-18 19:23:06
54.38.36.210 attack
Apr 18 10:47:43 l03 sshd[11668]: Invalid user ubuntu from 54.38.36.210 port 41966
...
2020-04-18 19:50:56
106.54.13.167 attack
21 attempts against mh-ssh on cloud
2020-04-18 19:25:30
122.238.28.228 attackspambots
TCP Port Scanning
2020-04-18 19:43:33
148.235.57.184 attackspam
Bruteforce detected by fail2ban
2020-04-18 19:48:27
64.227.17.251 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 53 - port: 5514 proto: TCP cat: Misc Attack
2020-04-18 19:11:25
148.251.99.90 attack
$f2bV_matches
2020-04-18 19:15:22
171.6.189.184 attackbotsspam
scan z
2020-04-18 19:32:11

Recently Reported IPs

141.0.13.158 141.0.13.16 141.0.13.160 141.0.13.155
141.0.13.157 141.0.13.161 141.0.13.163 141.0.13.164
141.0.13.162 141.0.13.165 141.0.13.166 141.0.13.167
141.0.13.168 118.96.127.8 118.96.128.131 118.96.129.122
118.96.129.202 141.0.13.37 141.0.13.39 141.0.13.36