Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.76
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.76.			IN	A

;; AUTHORITY SECTION:
.			235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:52 CST 2022
;; MSG SIZE  rcvd: 104
Host info
76.13.0.141.in-addr.arpa domain name pointer n27-04-04.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
76.13.0.141.in-addr.arpa	name = n27-04-04.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.117.241 attackspam
Nov 21 16:43:47 mail sshd[26135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.241  user=root
Nov 21 16:43:49 mail sshd[26135]: Failed password for root from 106.13.117.241 port 49705 ssh2
Nov 21 17:06:28 mail sshd[29099]: Invalid user truste from 106.13.117.241
Nov 21 17:06:28 mail sshd[29099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.241
Nov 21 17:06:28 mail sshd[29099]: Invalid user truste from 106.13.117.241
Nov 21 17:06:29 mail sshd[29099]: Failed password for invalid user truste from 106.13.117.241 port 47994 ssh2
...
2019-11-22 04:20:49
51.254.38.216 attack
Nov 21 17:12:47 SilenceServices sshd[31658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.216
Nov 21 17:12:50 SilenceServices sshd[31658]: Failed password for invalid user ring from 51.254.38.216 port 43744 ssh2
Nov 21 17:16:25 SilenceServices sshd[1651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.216
2019-11-22 04:02:28
31.184.254.126 attack
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.184.254.126
2019-11-22 04:09:06
5.53.124.102 attack
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.53.124.102
2019-11-22 04:32:02
116.7.11.87 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 04:14:53
193.56.28.180 attackspambots
Postfix SMTP rejection
...
2019-11-22 04:14:09
49.205.217.211 attackspam
Automatic report - Port Scan Attack
2019-11-22 04:27:07
85.171.37.47 attack
Nov 21 04:49:05 tdfoods sshd\[3274\]: Invalid user pi from 85.171.37.47
Nov 21 04:49:05 tdfoods sshd\[3276\]: Invalid user pi from 85.171.37.47
Nov 21 04:49:05 tdfoods sshd\[3274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-37-47.rev.numericable.fr
Nov 21 04:49:06 tdfoods sshd\[3276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85-171-37-47.rev.numericable.fr
Nov 21 04:49:08 tdfoods sshd\[3276\]: Failed password for invalid user pi from 85.171.37.47 port 59202 ssh2
2019-11-22 04:40:09
43.247.40.254 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-22 04:22:04
116.211.118.249 attackspam
Telnet Server BruteForce Attack
2019-11-22 04:19:29
185.216.132.15 attackspam
Nov 21 21:05:45 ns382633 sshd\[24341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
Nov 21 21:05:47 ns382633 sshd\[24341\]: Failed password for root from 185.216.132.15 port 54631 ssh2
Nov 21 21:05:48 ns382633 sshd\[24343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
Nov 21 21:05:49 ns382633 sshd\[24343\]: Failed password for root from 185.216.132.15 port 55008 ssh2
Nov 21 21:05:50 ns382633 sshd\[24345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
2019-11-22 04:18:31
77.227.231.194 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/77.227.231.194/ 
 
 ES - 1H : (40)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN12430 
 
 IP : 77.227.231.194 
 
 CIDR : 77.226.0.0/15 
 
 PREFIX COUNT : 131 
 
 UNIQUE IP COUNT : 3717120 
 
 
 ATTACKS DETECTED ASN12430 :  
  1H - 1 
  3H - 4 
  6H - 6 
 12H - 12 
 24H - 19 
 
 DateTime : 2019-11-21 15:49:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-22 04:02:02
61.148.16.162 attackspam
Nov 18 10:04:40 cumulus sshd[7812]: Invalid user mwf2 from 61.148.16.162 port 63891
Nov 18 10:04:40 cumulus sshd[7812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.16.162
Nov 18 10:04:42 cumulus sshd[7812]: Failed password for invalid user mwf2 from 61.148.16.162 port 63891 ssh2
Nov 18 10:04:43 cumulus sshd[7812]: Received disconnect from 61.148.16.162 port 63891:11: Bye Bye [preauth]
Nov 18 10:04:43 cumulus sshd[7812]: Disconnected from 61.148.16.162 port 63891 [preauth]
Nov 18 10:15:21 cumulus sshd[8359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.148.16.162  user=r.r
Nov 18 10:15:23 cumulus sshd[8359]: Failed password for r.r from 61.148.16.162 port 63893 ssh2
Nov 18 10:15:23 cumulus sshd[8359]: Received disconnect from 61.148.16.162 port 63893:11: Bye Bye [preauth]
Nov 18 10:15:23 cumulus sshd[8359]: Disconnected from 61.148.16.162 port 63893 [preauth]
Nov 18 10:20:18 ........
-------------------------------
2019-11-22 04:06:44
178.33.185.70 attackbotsspam
$f2bV_matches_ltvn
2019-11-22 04:00:38
115.79.61.20 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 04:33:48

Recently Reported IPs

141.0.13.71 141.0.13.78 118.96.131.196 141.0.13.81
141.0.13.80 141.0.13.74 141.0.13.75 141.0.13.8
141.0.13.82 141.0.13.83 141.0.13.84 141.0.13.86
141.0.13.87 141.0.13.85 141.0.13.88 141.0.13.89
141.0.13.91 141.0.13.9 141.0.13.95 141.0.13.93