Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.8.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6099
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.8.142.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:21:08 CST 2022
;; MSG SIZE  rcvd: 104
Host info
142.8.0.141.in-addr.arpa domain name pointer sg22-04-12.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.8.0.141.in-addr.arpa	name = sg22-04-12.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.120.22.16 attackspam
SSH brute force attempt
2020-09-10 05:34:28
51.68.123.198 attackspambots
Sep  9 21:47:30 haigwepa sshd[17225]: Failed password for root from 51.68.123.198 port 60734 ssh2
...
2020-09-10 05:50:34
88.99.87.73 attack
Attempting to download environment file
2020-09-10 05:54:14
140.143.196.66 attackbots
140.143.196.66 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  9 12:47:56 server5 sshd[32597]: Failed password for root from 193.112.180.221 port 50278 ssh2
Sep  9 12:48:45 server5 sshd[629]: Failed password for root from 86.247.118.135 port 50174 ssh2
Sep  9 12:48:34 server5 sshd[566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.196.66  user=root
Sep  9 12:48:36 server5 sshd[566]: Failed password for root from 140.143.196.66 port 59976 ssh2
Sep  9 12:53:42 server5 sshd[2994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23  user=root

IP Addresses Blocked:

193.112.180.221 (CN/China/-)
86.247.118.135 (FR/France/-)
2020-09-10 05:56:48
91.192.6.110 attackspambots
445
2020-09-10 05:50:06
42.113.144.86 attackbotsspam
20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86
20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86
...
2020-09-10 05:34:52
188.168.27.71 attackspambots
Dovecot Invalid User Login Attempt.
2020-09-10 05:34:10
64.225.122.157 attackbots
Sep  9 23:39:27 rancher-0 sshd[1515742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.122.157  user=root
Sep  9 23:39:29 rancher-0 sshd[1515742]: Failed password for root from 64.225.122.157 port 43998 ssh2
...
2020-09-10 06:00:59
47.89.18.138 attackspambots
47.89.18.138 - - \[09/Sep/2020:18:53:46 +0200\] "POST /wp-login.php HTTP/1.0" 200 3535 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.89.18.138 - - \[09/Sep/2020:18:53:50 +0200\] "POST /wp-login.php HTTP/1.0" 200 3489 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
47.89.18.138 - - \[09/Sep/2020:18:53:55 +0200\] "POST /wp-login.php HTTP/1.0" 200 3491 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-09-10 05:50:46
88.214.26.97 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-09T21:40:17Z
2020-09-10 05:41:43
51.178.50.20 attackbots
detected by Fail2Ban
2020-09-10 05:47:36
5.188.86.206 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-09T21:53:34Z
2020-09-10 06:01:27
185.66.128.228 attackbots
20/9/9@12:53:55: FAIL: Alarm-Intrusion address from=185.66.128.228
...
2020-09-10 05:53:26
196.41.122.94 attackspambots
[09/Sep/2020:21:31:10 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-10 05:59:47
184.105.247.250 attack
 TCP (SYN) 184.105.247.250:60470 -> port 23, len 44
2020-09-10 05:48:22

Recently Reported IPs

141.0.8.140 118.96.154.119 141.0.8.141 141.0.8.145
141.0.8.14 141.0.8.143 141.0.8.146 141.0.8.144
118.96.154.164 118.96.154.191 141.0.8.245 141.0.8.250
141.0.8.249 141.0.8.251 141.0.8.252 141.0.8.254
141.0.8.247 141.0.8.253 141.0.8.25 118.96.154.202