Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.0.9.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.0.9.45.			IN	A

;; AUTHORITY SECTION:
.			456	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:22:25 CST 2022
;; MSG SIZE  rcvd: 103
Host info
45.9.0.141.in-addr.arpa domain name pointer sg24-06-02.opera-mini.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.9.0.141.in-addr.arpa	name = sg24-06-02.opera-mini.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
31.0.85.200 attackspam
Lines containing failures of 31.0.85.200
Jul 13 16:52:42 mellenthin postfix/smtpd[7337]: connect from unknown[31.0.85.200]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.0.85.200
2019-07-14 04:02:25
176.198.118.131 attackspambots
Jul 13 19:49:14 s64-1 sshd[1212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.198.118.131
Jul 13 19:49:16 s64-1 sshd[1212]: Failed password for invalid user gold from 176.198.118.131 port 40701 ssh2
Jul 13 19:57:26 s64-1 sshd[1339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.198.118.131
...
2019-07-14 03:34:31
41.90.9.34 attackspambots
Brute force attempt
2019-07-14 03:50:07
157.230.98.238 attackspam
SSH Brute Force, server-1 sshd[6135]: Failed password for invalid user brian from 157.230.98.238 port 33270 ssh2
2019-07-14 04:09:12
154.124.59.0 attack
Lines containing failures of 154.124.59.0
Jul 13 05:49:30 mellenthin postfix/smtpd[14658]: connect from unknown[154.124.59.0]
Jul x@x
Jul 13 05:49:30 mellenthin postfix/smtpd[14658]: lost connection after DATA from unknown[154.124.59.0]
Jul 13 05:49:30 mellenthin postfix/smtpd[14658]: disconnect from unknown[154.124.59.0] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 13 16:52:57 mellenthin postfix/smtpd[5323]: connect from unknown[154.124.59.0]
Jul x@x
Jul 13 16:52:58 mellenthin postfix/smtpd[5323]: lost connection after DATA from unknown[154.124.59.0]
Jul 13 16:52:58 mellenthin postfix/smtpd[5323]: disconnect from unknown[154.124.59.0] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=154.124.59.0
2019-07-14 03:38:00
157.230.235.233 attackbotsspam
Jul 13 21:01:34 vps691689 sshd[21725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
Jul 13 21:01:36 vps691689 sshd[21725]: Failed password for invalid user lxy from 157.230.235.233 port 59624 ssh2
Jul 13 21:07:14 vps691689 sshd[21907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.235.233
...
2019-07-14 04:05:19
181.43.47.196 attackspam
Jul 13 16:52:45 mxgate1 postfix/postscreen[29762]: CONNECT from [181.43.47.196]:26277 to [176.31.12.44]:25
Jul 13 16:52:45 mxgate1 postfix/dnsblog[29811]: addr 181.43.47.196 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 13 16:52:45 mxgate1 postfix/dnsblog[29811]: addr 181.43.47.196 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 13 16:52:45 mxgate1 postfix/dnsblog[29764]: addr 181.43.47.196 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 13 16:52:45 mxgate1 postfix/dnsblog[29763]: addr 181.43.47.196 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 13 16:52:46 mxgate1 postfix/dnsblog[29765]: addr 181.43.47.196 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul 13 16:52:51 mxgate1 postfix/postscreen[29762]: DNSBL rank 5 for [181.43.47.196]:26277
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.43.47.196
2019-07-14 03:42:57
77.29.59.241 attackbots
Lines containing failures of 77.29.59.241
Jul 13 16:52:54 mellenthin postfix/smtpd[1487]: connect from unknown[77.29.59.241]
Jul x@x
Jul 13 16:52:56 mellenthin postfix/smtpd[1487]: lost connection after DATA from unknown[77.29.59.241]
Jul 13 16:52:56 mellenthin postfix/smtpd[1487]: disconnect from unknown[77.29.59.241] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.29.59.241
2019-07-14 03:35:31
37.108.54.143 attack
SPF Fail sender not permitted to send mail for @evilazrael.de
2019-07-14 03:48:50
187.116.89.162 attackbotsspam
Jul 13 21:57:08 rpi sshd[6165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.116.89.162 
Jul 13 21:57:10 rpi sshd[6165]: Failed password for invalid user kafka from 187.116.89.162 port 33323 ssh2
2019-07-14 04:04:28
177.37.203.90 attackspam
2019-07-13T07:45:32.954409stt-1.[munged] kernel: [7049953.579301] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=177.37.203.90 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=14579 DF PROTO=TCP SPT=30649 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-13T10:58:33.082018stt-1.[munged] kernel: [7061533.669472] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=177.37.203.90 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=25811 DF PROTO=TCP SPT=41393 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
2019-07-13T11:11:36.102320stt-1.[munged] kernel: [7062316.687459] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:a8:41:08:00 SRC=177.37.203.90 DST=[mungedIP1] LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=31300 DF PROTO=TCP SPT=22359 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0
2019-07-14 03:31:27
185.176.26.14 attack
13.07.2019 17:36:39 Connection to port 5000 blocked by firewall
2019-07-14 03:40:38
190.109.43.28 attack
Jul 13 11:11:06 web1 postfix/smtpd[14724]: warning: unknown[190.109.43.28]: SASL PLAIN authentication failed: authentication failure
...
2019-07-14 03:45:28
177.92.240.252 attackspambots
failed_logins
2019-07-14 03:46:58
177.84.98.123 attackspam
Jul 13 15:17:45 web1 postfix/smtpd[24598]: warning: unknown[177.84.98.123]: SASL PLAIN authentication failed: authentication failure
...
2019-07-14 03:53:25

Recently Reported IPs

141.0.9.40 141.0.9.5 141.0.9.49 141.0.9.50
141.0.9.53 141.0.9.51 141.0.9.54 141.0.9.55
141.0.9.56 141.0.9.58 141.0.9.59 118.96.155.61
141.0.9.48 141.0.9.57 118.96.155.66 118.96.155.94
118.96.156.131 118.96.156.57 118.96.156.70 141.101.122.161