Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.68.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 145 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:48 CST 2022
;; MSG SIZE  rcvd: 104
Host info
68.13.0.141.in-addr.arpa domain name pointer n27-03-08.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.13.0.141.in-addr.arpa	name = n27-03-08.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.48.127 attackbotsspam
2020-05-23T15:54:04.410842mail.broermann.family sshd[15720]: Invalid user aew from 51.38.48.127 port 38788
2020-05-23T15:54:04.414200mail.broermann.family sshd[15720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-38-48.eu
2020-05-23T15:54:04.410842mail.broermann.family sshd[15720]: Invalid user aew from 51.38.48.127 port 38788
2020-05-23T15:54:06.669078mail.broermann.family sshd[15720]: Failed password for invalid user aew from 51.38.48.127 port 38788 ssh2
2020-05-23T15:57:52.182475mail.broermann.family sshd[15839]: Invalid user hqs from 51.38.48.127 port 44786
...
2020-05-23 22:04:16
103.16.202.174 attackspam
May 23 22:01:47 pihole sshd[26681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.16.202.174 
...
2020-05-23 22:06:11
129.211.157.209 attackbots
2020-05-23T11:56:08.500875abusebot-3.cloudsearch.cf sshd[9998]: Invalid user gvm from 129.211.157.209 port 45374
2020-05-23T11:56:08.512848abusebot-3.cloudsearch.cf sshd[9998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.157.209
2020-05-23T11:56:08.500875abusebot-3.cloudsearch.cf sshd[9998]: Invalid user gvm from 129.211.157.209 port 45374
2020-05-23T11:56:10.020338abusebot-3.cloudsearch.cf sshd[9998]: Failed password for invalid user gvm from 129.211.157.209 port 45374 ssh2
2020-05-23T12:01:53.701686abusebot-3.cloudsearch.cf sshd[10308]: Invalid user gvp from 129.211.157.209 port 51182
2020-05-23T12:01:53.707527abusebot-3.cloudsearch.cf sshd[10308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.157.209
2020-05-23T12:01:53.701686abusebot-3.cloudsearch.cf sshd[10308]: Invalid user gvp from 129.211.157.209 port 51182
2020-05-23T12:01:56.243909abusebot-3.cloudsearch.cf sshd[10308]: Failed
...
2020-05-23 21:57:15
95.188.193.174 attack
Unauthorized connection attempt from IP address 95.188.193.174 on Port 445(SMB)
2020-05-23 22:30:29
49.235.16.103 attackspambots
May 23 06:26:00 server1 sshd\[4916\]: Failed password for invalid user xcx from 49.235.16.103 port 50560 ssh2
May 23 06:30:41 server1 sshd\[9658\]: Invalid user gjs from 49.235.16.103
May 23 06:30:41 server1 sshd\[9658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103 
May 23 06:30:43 server1 sshd\[9658\]: Failed password for invalid user gjs from 49.235.16.103 port 47968 ssh2
May 23 06:35:25 server1 sshd\[5247\]: Invalid user uov from 49.235.16.103
...
2020-05-23 22:07:13
116.247.81.99 attackspambots
(sshd) Failed SSH login from 116.247.81.99 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 23 13:50:26 amsweb01 sshd[10500]: Invalid user rjr from 116.247.81.99 port 58731
May 23 13:50:28 amsweb01 sshd[10500]: Failed password for invalid user rjr from 116.247.81.99 port 58731 ssh2
May 23 13:59:09 amsweb01 sshd[11920]: Invalid user auw from 116.247.81.99 port 57601
May 23 13:59:10 amsweb01 sshd[11920]: Failed password for invalid user auw from 116.247.81.99 port 57601 ssh2
May 23 14:01:27 amsweb01 sshd[12247]: Invalid user rdv from 116.247.81.99 port 49169
2020-05-23 22:20:33
202.152.1.67 attack
May 23 09:37:41 NPSTNNYC01T sshd[21413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.1.67
May 23 09:37:42 NPSTNNYC01T sshd[21413]: Failed password for invalid user ozo from 202.152.1.67 port 46394 ssh2
May 23 09:43:17 NPSTNNYC01T sshd[21847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.1.67
...
2020-05-23 22:01:18
182.53.26.196 attackbots
Unauthorized connection attempt from IP address 182.53.26.196 on Port 445(SMB)
2020-05-23 22:32:45
117.240.172.19 attackspambots
2020-05-23T13:53:27.338265shield sshd\[21715\]: Invalid user oxt from 117.240.172.19 port 36166
2020-05-23T13:53:27.342999shield sshd\[21715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.240.172.19
2020-05-23T13:53:29.516891shield sshd\[21715\]: Failed password for invalid user oxt from 117.240.172.19 port 36166 ssh2
2020-05-23T13:58:22.122129shield sshd\[23054\]: Invalid user pwu from 117.240.172.19 port 38408
2020-05-23T13:58:22.125098shield sshd\[23054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.240.172.19
2020-05-23 22:08:44
103.250.185.144 attackspam
May 23 16:00:20 vpn01 sshd[3368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.185.144
May 23 16:00:22 vpn01 sshd[3368]: Failed password for invalid user oku from 103.250.185.144 port 52266 ssh2
...
2020-05-23 22:19:34
212.64.19.123 attack
May 23 10:10:05 NPSTNNYC01T sshd[24092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.123
May 23 10:10:07 NPSTNNYC01T sshd[24092]: Failed password for invalid user zxr from 212.64.19.123 port 42256 ssh2
May 23 10:13:57 NPSTNNYC01T sshd[24387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.123
...
2020-05-23 22:26:08
35.200.185.127 attackspambots
Automatic report - Banned IP Access
2020-05-23 22:05:30
85.95.177.11 attackspam
Unauthorized connection attempt from IP address 85.95.177.11 on Port 445(SMB)
2020-05-23 22:33:28
111.229.72.226 attack
May 23 15:13:25 lnxmail61 sshd[15672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.72.226
2020-05-23 22:14:33
107.175.83.200 attackbotsspam
SSH Brute-Forcing (server1)
2020-05-23 21:52:54

Recently Reported IPs

141.0.13.69 141.0.13.60 141.0.13.59 141.0.13.66
141.0.13.62 141.0.13.70 141.0.13.7 141.0.13.6
141.0.13.72 141.0.13.73 141.0.13.79 141.0.13.77
141.0.13.71 141.0.13.76 141.0.13.78 118.96.131.196
141.0.13.81 141.0.13.80 141.0.13.74 141.0.13.75