Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.41.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:41 CST 2022
;; MSG SIZE  rcvd: 104
Host info
41.13.0.141.in-addr.arpa domain name pointer n27-01-05.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.13.0.141.in-addr.arpa	name = n27-01-05.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.168.115.36 attack
Invalid user seamark from 121.168.115.36 port 42788
2019-11-27 01:51:54
151.80.41.64 attack
Nov 26 15:15:01 game-panel sshd[6625]: Failed password for root from 151.80.41.64 port 44476 ssh2
Nov 26 15:21:11 game-panel sshd[6834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.64
Nov 26 15:21:13 game-panel sshd[6834]: Failed password for invalid user huro from 151.80.41.64 port 34025 ssh2
2019-11-27 01:32:43
51.254.114.105 attackspam
Nov 26 18:01:41 root sshd[2810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.114.105 
Nov 26 18:01:43 root sshd[2810]: Failed password for invalid user www from 51.254.114.105 port 46187 ssh2
Nov 26 18:08:07 root sshd[2938]: Failed password for root from 51.254.114.105 port 53878 ssh2
...
2019-11-27 02:02:17
142.44.184.79 attackspam
Nov 26 07:05:28 php1 sshd\[13022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79  user=root
Nov 26 07:05:31 php1 sshd\[13022\]: Failed password for root from 142.44.184.79 port 49812 ssh2
Nov 26 07:11:51 php1 sshd\[13644\]: Invalid user lena from 142.44.184.79
Nov 26 07:11:51 php1 sshd\[13644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79
Nov 26 07:11:53 php1 sshd\[13644\]: Failed password for invalid user lena from 142.44.184.79 port 59178 ssh2
2019-11-27 01:51:31
189.135.87.216 attackbots
Automatic report - Port Scan Attack
2019-11-27 01:32:11
14.186.223.204 attack
Nov 26 15:37:30 mail postfix/smtps/smtpd[3679]: warning: unknown[14.186.223.204]: SASL PLAIN authentication failed: 
Nov 26 15:37:56 mail postfix/smtpd[3259]: warning: unknown[14.186.223.204]: SASL PLAIN authentication failed: 
Nov 26 15:39:16 mail postfix/smtpd[3433]: warning: unknown[14.186.223.204]: SASL PLAIN authentication failed:
2019-11-27 01:50:01
63.81.87.223 attackspambots
Lines containing failures of 63.81.87.223
Nov 26 15:44:19 shared01 postfix/smtpd[18108]: connect from cuddly.kaanahr.com[63.81.87.223]
Nov 26 15:44:20 shared01 policyd-spf[18600]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=63.81.87.223; helo=cuddly.watshpp.com; envelope-from=x@x
Nov x@x
Nov 26 15:44:20 shared01 postfix/smtpd[18108]: disconnect from cuddly.kaanahr.com[63.81.87.223] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 26 15:45:12 shared01 postfix/smtpd[18108]: connect from cuddly.kaanahr.com[63.81.87.223]
Nov 26 15:45:13 shared01 policyd-spf[18600]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=63.81.87.223; helo=cuddly.watshpp.com; envelope-from=x@x
Nov x@x
Nov 26 15:45:13 shared01 postfix/smtpd[18108]: disconnect from cuddly.kaanahr.com[63.81.87.223] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5
Nov 26 15:45:39 shared01 postfix/smtpd[11050]: connect from cuddly.kaanahr.com[63.8........
------------------------------
2019-11-27 01:55:12
80.151.236.165 attack
Nov 26 16:47:50 v22018086721571380 sshd[17118]: Failed password for invalid user vpnguardbot from 80.151.236.165 port 36183 ssh2
2019-11-27 01:40:28
218.92.0.163 attack
Nov 26 18:40:12 localhost sshd\[29280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163  user=root
Nov 26 18:40:14 localhost sshd\[29280\]: Failed password for root from 218.92.0.163 port 65456 ssh2
Nov 26 18:40:17 localhost sshd\[29280\]: Failed password for root from 218.92.0.163 port 65456 ssh2
2019-11-27 01:40:42
212.156.222.160 attackspam
Automatic report - Port Scan Attack
2019-11-27 02:06:24
219.133.71.26 attack
2019-11-26T14:44:06.701757abusebot.cloudsearch.cf sshd\[28014\]: Invalid user shanon from 219.133.71.26 port 51822
2019-11-27 01:56:19
139.59.238.14 attackbots
Nov 26 17:49:40 v22018076622670303 sshd\[7005\]: Invalid user euclid123 from 139.59.238.14 port 38986
Nov 26 17:49:40 v22018076622670303 sshd\[7005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14
Nov 26 17:49:42 v22018076622670303 sshd\[7005\]: Failed password for invalid user euclid123 from 139.59.238.14 port 38986 ssh2
...
2019-11-27 01:48:20
31.184.253.128 attack
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2019-11-27 02:01:08
159.65.180.64 attackbots
Nov 26 18:31:06 sauna sshd[13530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.180.64
Nov 26 18:31:08 sauna sshd[13530]: Failed password for invalid user sysnet from 159.65.180.64 port 37194 ssh2
...
2019-11-27 01:36:59
118.171.43.188 attackbotsspam
Hits on port : 2323
2019-11-27 01:45:06

Recently Reported IPs

141.0.13.45 141.0.13.38 141.0.13.40 141.0.13.42
141.0.13.43 141.0.13.47 141.0.13.44 141.0.13.46
118.96.13.156 141.0.13.48 141.0.13.49 141.0.13.5
141.0.13.53 141.0.13.56 141.0.13.55 141.0.13.51
141.0.13.50 141.0.13.52 141.0.13.54 141.0.13.57