Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.40.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:42 CST 2022
;; MSG SIZE  rcvd: 104
Host info
40.13.0.141.in-addr.arpa domain name pointer n27-01-04.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.13.0.141.in-addr.arpa	name = n27-01-04.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.31.136 attack
2019-09-15T23:58:03.210653abusebot.cloudsearch.cf sshd\[24852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-16 08:00:21
113.128.65.229 attackspambots
Sep 14 01:52:41 tux postfix/smtpd[17435]: connect from unknown[113.128.65.229]
Sep x@x
Sep 14 01:52:43 tux postfix/smtpd[17435]: lost connection after RCPT from unknown[113.128.65.229]
Sep 14 01:52:43 tux postfix/smtpd[17435]: disconnect from unknown[113.128.65.229]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.128.65.229
2019-09-16 08:18:10
171.221.230.220 attackspambots
Sep 16 03:17:20 www sshd\[185320\]: Invalid user 123456 from 171.221.230.220
Sep 16 03:17:20 www sshd\[185320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.230.220
Sep 16 03:17:22 www sshd\[185320\]: Failed password for invalid user 123456 from 171.221.230.220 port 3298 ssh2
...
2019-09-16 08:18:51
202.86.173.59 attackbotsspam
F2B jail: sshd. Time: 2019-09-16 01:38:06, Reported by: VKReport
2019-09-16 08:19:41
115.84.91.163 attackbotsspam
Chat Spam
2019-09-16 08:31:46
218.25.89.90 attack
Sep 15 19:49:04 xtremcommunity sshd\[125121\]: Invalid user fluentd from 218.25.89.90 port 52038
Sep 15 19:49:04 xtremcommunity sshd\[125121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.25.89.90
Sep 15 19:49:06 xtremcommunity sshd\[125121\]: Failed password for invalid user fluentd from 218.25.89.90 port 52038 ssh2
Sep 15 19:54:43 xtremcommunity sshd\[125240\]: Invalid user vinitha from 218.25.89.90 port 41402
Sep 15 19:54:43 xtremcommunity sshd\[125240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.25.89.90
...
2019-09-16 08:08:10
171.228.154.49 attackspambots
Chat Spam
2019-09-16 08:24:01
177.124.89.14 attackbots
Sep 16 02:22:47 SilenceServices sshd[22016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.89.14
Sep 16 02:22:49 SilenceServices sshd[22016]: Failed password for invalid user cklee from 177.124.89.14 port 45938 ssh2
Sep 16 02:28:17 SilenceServices sshd[26112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.89.14
2019-09-16 08:29:41
188.246.233.85 attack
Sep 15 14:04:52 hcbb sshd\[10561\]: Invalid user sales from 188.246.233.85
Sep 15 14:04:52 hcbb sshd\[10561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.246.233.85
Sep 15 14:04:54 hcbb sshd\[10561\]: Failed password for invalid user sales from 188.246.233.85 port 36308 ssh2
Sep 15 14:09:01 hcbb sshd\[11002\]: Invalid user user from 188.246.233.85
Sep 15 14:09:02 hcbb sshd\[11002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.246.233.85
2019-09-16 08:30:55
51.38.153.207 attack
2019-09-15T23:58:13.348219abusebot-4.cloudsearch.cf sshd\[17531\]: Invalid user ov from 51.38.153.207 port 58590
2019-09-16 08:05:15
51.38.80.173 attack
Sep 15 14:04:27 php1 sshd\[9549\]: Invalid user batuhan from 51.38.80.173
Sep 15 14:04:27 php1 sshd\[9549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu
Sep 15 14:04:28 php1 sshd\[9549\]: Failed password for invalid user batuhan from 51.38.80.173 port 35416 ssh2
Sep 15 14:08:29 php1 sshd\[10015\]: Invalid user master from 51.38.80.173
Sep 15 14:08:29 php1 sshd\[10015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu
2019-09-16 08:20:38
92.119.160.52 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-16 08:04:21
218.92.0.163 attack
Sep 16 01:20:22 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:25 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:28 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
Sep 16 01:20:31 lnxweb61 sshd[15281]: Failed password for root from 218.92.0.163 port 28937 ssh2
2019-09-16 08:38:38
129.158.73.144 attack
Sep 16 01:51:10 OPSO sshd\[5876\]: Invalid user johny from 129.158.73.144 port 41214
Sep 16 01:51:10 OPSO sshd\[5876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144
Sep 16 01:51:12 OPSO sshd\[5876\]: Failed password for invalid user johny from 129.158.73.144 port 41214 ssh2
Sep 16 01:55:42 OPSO sshd\[7494\]: Invalid user test from 129.158.73.144 port 63853
Sep 16 01:55:42 OPSO sshd\[7494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.158.73.144
2019-09-16 08:35:27
220.128.180.118 attack
Sep 15 14:06:33 hpm sshd\[25409\]: Invalid user ctrls from 220.128.180.118
Sep 15 14:06:33 hpm sshd\[25409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-128-180-118.hinet-ip.hinet.net
Sep 15 14:06:35 hpm sshd\[25409\]: Failed password for invalid user ctrls from 220.128.180.118 port 14870 ssh2
Sep 15 14:15:45 hpm sshd\[26335\]: Invalid user cw from 220.128.180.118
Sep 15 14:15:45 hpm sshd\[26335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-128-180-118.hinet-ip.hinet.net
2019-09-16 08:23:19

Recently Reported IPs

141.0.13.38 141.0.13.42 141.0.13.43 141.0.13.47
141.0.13.44 141.0.13.46 118.96.13.156 141.0.13.48
141.0.13.49 141.0.13.5 141.0.13.53 141.0.13.56
141.0.13.55 141.0.13.51 141.0.13.50 141.0.13.52
141.0.13.54 141.0.13.57 141.0.13.58 141.0.13.63