Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.72.			IN	A

;; AUTHORITY SECTION:
.			157	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:51 CST 2022
;; MSG SIZE  rcvd: 104
Host info
72.13.0.141.in-addr.arpa domain name pointer n27-03-12.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.13.0.141.in-addr.arpa	name = n27-03-12.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.0.149.75 attackbotsspam
Unauthorized connection attempt from IP address 212.0.149.75 on Port 445(SMB)
2020-07-15 20:50:22
167.71.209.2 attack
Port scan: Attack repeated for 24 hours
2020-07-15 20:55:03
52.188.23.7 attackspambots
Fail2Ban Ban Triggered
2020-07-15 20:52:12
108.59.0.103 attackspam
108.59.0.103 was recorded 5 times by 4 hosts attempting to connect to the following ports: 16050,26050. Incident counter (4h, 24h, all-time): 5, 16, 59
2020-07-15 20:37:03
203.192.225.87 attack
Unauthorized connection attempt from IP address 203.192.225.87 on Port 445(SMB)
2020-07-15 20:49:25
118.71.190.9 attackbotsspam
Unauthorized connection attempt from IP address 118.71.190.9 on Port 445(SMB)
2020-07-15 20:27:35
143.255.8.2 attackspam
07/15/2020-08:24:43.710702 143.255.8.2 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-15 20:43:48
115.77.229.218 spambotsattackproxynormal
2048
2020-07-15 20:22:40
116.193.163.235 attackspambots
Unauthorized connection attempt from IP address 116.193.163.235 on Port 445(SMB)
2020-07-15 20:44:01
102.133.228.153 attackspambots
Jul 15 15:27:36 ift sshd\[47555\]: Invalid user ift.org.ua from 102.133.228.153Jul 15 15:27:36 ift sshd\[47558\]: Invalid user org from 102.133.228.153Jul 15 15:27:38 ift sshd\[47558\]: Failed password for invalid user org from 102.133.228.153 port 11641 ssh2Jul 15 15:27:38 ift sshd\[47555\]: Failed password for invalid user ift.org.ua from 102.133.228.153 port 11642 ssh2Jul 15 15:27:38 ift sshd\[47556\]: Failed password for ift from 102.133.228.153 port 11640 ssh2
...
2020-07-15 20:33:02
185.143.73.203 attack
Jul 15 13:21:17 blackbee postfix/smtpd[9986]: warning: unknown[185.143.73.203]: SASL LOGIN authentication failed: authentication failure
Jul 15 13:21:41 blackbee postfix/smtpd[9986]: warning: unknown[185.143.73.203]: SASL LOGIN authentication failed: authentication failure
Jul 15 13:22:03 blackbee postfix/smtpd[10205]: warning: unknown[185.143.73.203]: SASL LOGIN authentication failed: authentication failure
Jul 15 13:22:27 blackbee postfix/smtpd[10226]: warning: unknown[185.143.73.203]: SASL LOGIN authentication failed: authentication failure
Jul 15 13:22:49 blackbee postfix/smtpd[10226]: warning: unknown[185.143.73.203]: SASL LOGIN authentication failed: authentication failure
...
2020-07-15 20:43:07
180.76.177.130 attack
Jul 15 12:22:04 h2427292 sshd\[28472\]: Invalid user kevin from 180.76.177.130
Jul 15 12:22:04 h2427292 sshd\[28472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.177.130 
Jul 15 12:22:06 h2427292 sshd\[28472\]: Failed password for invalid user kevin from 180.76.177.130 port 58706 ssh2
...
2020-07-15 20:37:55
183.83.145.48 attackspam
1594808582 - 07/15/2020 12:23:02 Host: 183.83.145.48/183.83.145.48 Port: 445 TCP Blocked
2020-07-15 20:53:01
185.143.144.71 attackbotsspam
Honeypot attack, port: 5555, PTR: host-71.primonet.com.ua.
2020-07-15 20:42:44
178.33.229.120 attackspam
Invalid user produkcja from 178.33.229.120 port 52713
2020-07-15 20:36:45

Recently Reported IPs

141.0.13.6 141.0.13.73 141.0.13.79 141.0.13.77
141.0.13.71 141.0.13.76 141.0.13.78 118.96.131.196
141.0.13.81 141.0.13.80 141.0.13.74 141.0.13.75
141.0.13.8 141.0.13.82 141.0.13.83 141.0.13.84
141.0.13.86 141.0.13.87 141.0.13.85 141.0.13.88