Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.56.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:45 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 56.13.0.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.13.0.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
130.180.66.98 attackbotsspam
Nov 12 21:14:22 sachi sshd\[24570\]: Invalid user qianyi861003!@\# from 130.180.66.98
Nov 12 21:14:22 sachi sshd\[24570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz
Nov 12 21:14:24 sachi sshd\[24570\]: Failed password for invalid user qianyi861003!@\# from 130.180.66.98 port 40376 ssh2
Nov 12 21:20:59 sachi sshd\[25158\]: Invalid user marrec from 130.180.66.98
Nov 12 21:20:59 sachi sshd\[25158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz
2019-11-13 20:14:01
117.50.46.176 attackbotsspam
Nov 13 12:12:55 venus sshd\[3250\]: Invalid user balza from 117.50.46.176 port 52868
Nov 13 12:12:55 venus sshd\[3250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.176
Nov 13 12:12:57 venus sshd\[3250\]: Failed password for invalid user balza from 117.50.46.176 port 52868 ssh2
...
2019-11-13 20:23:57
187.189.11.49 attackspam
Nov 13 12:04:03 ns382633 sshd\[3835\]: Invalid user admin from 187.189.11.49 port 45548
Nov 13 12:04:03 ns382633 sshd\[3835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.11.49
Nov 13 12:04:05 ns382633 sshd\[3835\]: Failed password for invalid user admin from 187.189.11.49 port 45548 ssh2
Nov 13 12:09:51 ns382633 sshd\[4806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.11.49  user=root
Nov 13 12:09:53 ns382633 sshd\[4806\]: Failed password for root from 187.189.11.49 port 33332 ssh2
2019-11-13 20:02:57
103.49.155.90 attackspambots
Port 1433 Scan
2019-11-13 20:25:18
46.38.144.146 attackbots
Nov 13 13:20:11 vmanager6029 postfix/smtpd\[18808\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 13 13:20:47 vmanager6029 postfix/smtpd\[18808\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-13 20:21:43
49.88.112.65 attackbotsspam
scan r
2019-11-13 20:39:15
175.197.129.22 attack
IP attempted unauthorised action
2019-11-13 20:11:15
106.51.230.190 attackbotsspam
" "
2019-11-13 20:45:27
221.178.157.244 attackspam
Nov 12 15:38:50 server sshd\[7665\]: Failed password for invalid user guest from 221.178.157.244 port 46817 ssh2
Nov 13 13:30:10 server sshd\[27718\]: Invalid user new from 221.178.157.244
Nov 13 13:30:10 server sshd\[27718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.178.157.244 
Nov 13 13:30:12 server sshd\[27718\]: Failed password for invalid user new from 221.178.157.244 port 10305 ssh2
Nov 13 13:44:12 server sshd\[30672\]: Invalid user info from 221.178.157.244
...
2019-11-13 20:08:39
103.206.191.100 attack
Nov 13 10:04:06 venus sshd\[1597\]: Invalid user oracle from 103.206.191.100 port 60028
Nov 13 10:04:06 venus sshd\[1597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.191.100
Nov 13 10:04:08 venus sshd\[1597\]: Failed password for invalid user oracle from 103.206.191.100 port 60028 ssh2
...
2019-11-13 20:20:08
149.56.43.120 attack
WordPress XMLRPC scan :: 149.56.43.120 0.128 - [13/Nov/2019:06:21:31  0000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 194 "https://www.[censored_1]/" "PHP/6.2.50" "HTTP/1.1"
2019-11-13 20:22:28
129.211.104.34 attackbots
Nov 13 09:21:15 microserver sshd[7110]: Failed password for root from 129.211.104.34 port 43760 ssh2
Nov 13 09:25:48 microserver sshd[7747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.104.34  user=root
Nov 13 09:25:50 microserver sshd[7747]: Failed password for root from 129.211.104.34 port 52162 ssh2
Nov 13 09:30:24 microserver sshd[8420]: Invalid user webadmin from 129.211.104.34 port 60562
Nov 13 09:30:24 microserver sshd[8420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.104.34
Nov 13 09:43:30 microserver sshd[10043]: Invalid user ching from 129.211.104.34 port 57480
Nov 13 09:43:30 microserver sshd[10043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.104.34
Nov 13 09:43:32 microserver sshd[10043]: Failed password for invalid user ching from 129.211.104.34 port 57480 ssh2
Nov 13 09:48:27 microserver sshd[10759]: pam_unix(sshd:auth): authentication fail
2019-11-13 20:29:04
162.219.250.25 attack
www.geburtshaus-fulda.de 162.219.250.25 \[13/Nov/2019:10:39:00 +0100\] "POST /wp-login.php HTTP/1.1" 200 6383 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.geburtshaus-fulda.de 162.219.250.25 \[13/Nov/2019:10:39:01 +0100\] "POST /wp-login.php HTTP/1.1" 200 6387 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-13 20:23:33
122.139.147.251 attackbotsspam
Port Scan
2019-11-13 20:44:29
152.136.90.196 attack
Nov 13 10:05:35 Ubuntu-1404-trusty-64-minimal sshd\[13981\]: Invalid user blanchar from 152.136.90.196
Nov 13 10:05:35 Ubuntu-1404-trusty-64-minimal sshd\[13981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
Nov 13 10:05:37 Ubuntu-1404-trusty-64-minimal sshd\[13981\]: Failed password for invalid user blanchar from 152.136.90.196 port 41836 ssh2
Nov 13 10:50:55 Ubuntu-1404-trusty-64-minimal sshd\[7261\]: Invalid user gdm from 152.136.90.196
Nov 13 10:50:55 Ubuntu-1404-trusty-64-minimal sshd\[7261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
2019-11-13 20:28:19

Recently Reported IPs

141.0.13.53 141.0.13.55 141.0.13.51 141.0.13.50
141.0.13.52 141.0.13.54 141.0.13.57 141.0.13.58
141.0.13.63 141.0.13.61 118.96.130.140 141.0.13.67
141.0.13.64 141.0.13.65 141.0.13.69 141.0.13.68
141.0.13.60 141.0.13.59 141.0.13.66 141.0.13.62