Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.8.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.8.99.			IN	A

;; AUTHORITY SECTION:
.			295	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:21:45 CST 2022
;; MSG SIZE  rcvd: 103
Host info
99.8.0.141.in-addr.arpa domain name pointer sg22-01-05.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.8.0.141.in-addr.arpa	name = sg22-01-05.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.223.73.69 attackbots
Chat Spam
2020-03-29 07:54:56
139.162.161.120 attackspam
5060/udp 5060/udp
[2020-03-28]2pkt
2020-03-29 08:07:06
198.245.51.185 attack
Mar 29 00:10:54 ewelt sshd[32009]: Invalid user vaa from 198.245.51.185 port 51868
Mar 29 00:10:54 ewelt sshd[32009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.51.185
Mar 29 00:10:54 ewelt sshd[32009]: Invalid user vaa from 198.245.51.185 port 51868
Mar 29 00:10:55 ewelt sshd[32009]: Failed password for invalid user vaa from 198.245.51.185 port 51868 ssh2
...
2020-03-29 07:54:11
51.161.68.190 attackspambots
Attempted connection to port 22.
2020-03-29 07:55:31
5.238.116.197 attackspam
37215/tcp 37215/tcp
[2020-03-26]2pkt
2020-03-29 07:43:07
14.237.95.182 attack
23/tcp
[2020-03-28]1pkt
2020-03-29 07:45:09
60.249.230.218 attack
W 31101,/var/log/nginx/access.log,-,-
2020-03-29 07:56:56
14.191.214.76 attackspambots
445/tcp
[2020-03-28]1pkt
2020-03-29 07:53:37
119.31.123.146 attackspam
$f2bV_matches
2020-03-29 07:47:54
132.148.17.97 attackbots
xmlrpc attack
2020-03-29 07:35:00
180.76.104.167 attackspam
Invalid user webmaster from 180.76.104.167 port 47482
2020-03-29 08:08:40
187.3.139.213 attack
26/tcp 23/tcp
[2020-03-26/27]2pkt
2020-03-29 07:39:39
120.52.96.39 attackspam
37215/tcp
[2020-03-28]1pkt
2020-03-29 08:05:10
106.54.248.201 attack
Invalid user sabryn from 106.54.248.201 port 45732
2020-03-29 07:32:55
222.186.15.158 attackspam
Mar 29 00:30:29 MainVPS sshd[12173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Mar 29 00:30:31 MainVPS sshd[12173]: Failed password for root from 222.186.15.158 port 57947 ssh2
Mar 29 00:30:33 MainVPS sshd[12173]: Failed password for root from 222.186.15.158 port 57947 ssh2
Mar 29 00:30:29 MainVPS sshd[12173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Mar 29 00:30:31 MainVPS sshd[12173]: Failed password for root from 222.186.15.158 port 57947 ssh2
Mar 29 00:30:33 MainVPS sshd[12173]: Failed password for root from 222.186.15.158 port 57947 ssh2
Mar 29 00:30:29 MainVPS sshd[12173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Mar 29 00:30:31 MainVPS sshd[12173]: Failed password for root from 222.186.15.158 port 57947 ssh2
Mar 29 00:30:33 MainVPS sshd[12173]: Failed password for root from 222.186.15.158
2020-03-29 07:41:15

Recently Reported IPs

141.0.8.93 141.0.9.1 141.0.9.10 141.0.9.0
141.0.9.101 141.0.9.100 141.0.8.97 141.0.9.102
118.96.155.120 118.96.155.122 118.96.155.202 118.96.155.212
141.0.9.207 141.0.9.202 141.0.9.204 141.0.9.201
141.0.9.208 141.0.9.20 141.0.9.2 141.0.9.209