Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.13.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.13.9.			IN	A

;; AUTHORITY SECTION:
.			365	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:18:56 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 9.13.0.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.13.0.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.110.243.113 attackspam
May 11 15:25:57 eventyay sshd[2775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.110.243.113
May 11 15:25:59 eventyay sshd[2775]: Failed password for invalid user appuser from 189.110.243.113 port 40222 ssh2
May 11 15:31:36 eventyay sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.110.243.113
...
2020-05-12 04:30:36
210.1.88.22 attack
20/5/11@08:01:05: FAIL: Alarm-Network address from=210.1.88.22
...
2020-05-12 04:31:48
95.181.131.153 attack
May 11 22:10:36 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: Invalid user sme from 95.181.131.153
May 11 22:10:36 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153
May 11 22:10:38 Ubuntu-1404-trusty-64-minimal sshd\[14625\]: Failed password for invalid user sme from 95.181.131.153 port 48354 ssh2
May 11 22:19:52 Ubuntu-1404-trusty-64-minimal sshd\[19127\]: Invalid user aeltie from 95.181.131.153
May 11 22:19:52 Ubuntu-1404-trusty-64-minimal sshd\[19127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153
2020-05-12 04:34:24
51.15.202.122 attackbotsspam
May 11 2020, 12:33:36 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-05-12 04:04:14
185.14.187.133 attackspam
$f2bV_matches
2020-05-12 04:26:42
182.75.246.102 attackbots
Unauthorized connection attempt from IP address 182.75.246.102 on Port 445(SMB)
2020-05-12 04:15:49
158.69.55.25 attackbotsspam
(mod_security) mod_security (id:20000005) triggered by 158.69.55.25 (CA/Canada/box11.domaineinternet.ca): 5 in the last 300 secs
2020-05-12 04:43:43
116.228.160.22 attack
Brute force attempt
2020-05-12 04:46:38
111.85.96.173 attack
May 11 20:32:18 onepixel sshd[3059241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.85.96.173 
May 11 20:32:18 onepixel sshd[3059241]: Invalid user git from 111.85.96.173 port 44898
May 11 20:32:19 onepixel sshd[3059241]: Failed password for invalid user git from 111.85.96.173 port 44898 ssh2
May 11 20:37:34 onepixel sshd[3059846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.85.96.173  user=mysql
May 11 20:37:36 onepixel sshd[3059846]: Failed password for mysql from 111.85.96.173 port 44937 ssh2
2020-05-12 04:38:33
89.248.172.85 attack
firewall-block, port(s): 3739/tcp, 50091/tcp
2020-05-12 04:28:31
192.82.65.72 attack
Unauthorized connection attempt from IP address 192.82.65.72 on Port 445(SMB)
2020-05-12 04:24:31
174.105.201.174 attackbotsspam
May 11 17:29:35 inter-technics sshd[8653]: Invalid user samuel from 174.105.201.174 port 41720
May 11 17:29:35 inter-technics sshd[8653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.105.201.174
May 11 17:29:35 inter-technics sshd[8653]: Invalid user samuel from 174.105.201.174 port 41720
May 11 17:29:37 inter-technics sshd[8653]: Failed password for invalid user samuel from 174.105.201.174 port 41720 ssh2
May 11 17:32:08 inter-technics sshd[8858]: Invalid user vision from 174.105.201.174 port 48786
...
2020-05-12 04:18:38
85.174.227.140 attackbots
Unauthorized connection attempt from IP address 85.174.227.140 on Port 445(SMB)
2020-05-12 04:11:08
187.189.26.233 attackspambots
Unauthorized connection attempt from IP address 187.189.26.233 on Port 445(SMB)
2020-05-12 04:20:35
87.251.74.170 attack
 TCP (SYN) 87.251.74.170:59971 -> port 11550, len 44
2020-05-12 04:31:24

Recently Reported IPs

141.0.13.91 141.0.13.95 141.0.13.93 141.0.13.92
141.0.13.94 118.96.131.248 141.0.13.97 141.0.13.96
141.0.13.90 141.0.13.99 141.0.13.98 141.0.14.0
141.0.14.10 141.0.14.1 141.0.14.100 141.0.14.103
141.0.14.102 141.0.14.104 141.0.14.101 141.0.14.105