Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.136.41.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.136.41.16.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:16:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 16.41.136.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.41.136.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.105.82.53 attackspam
Aug  6 17:21:47 v22019038103785759 sshd\[6410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.105.82.53  user=root
Aug  6 17:21:49 v22019038103785759 sshd\[6410\]: Failed password for root from 210.105.82.53 port 58958 ssh2
Aug  6 17:26:14 v22019038103785759 sshd\[6577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.105.82.53  user=root
Aug  6 17:26:15 v22019038103785759 sshd\[6577\]: Failed password for root from 210.105.82.53 port 42024 ssh2
Aug  6 17:30:49 v22019038103785759 sshd\[6767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.105.82.53  user=root
...
2020-08-07 00:38:27
170.0.155.219 attackspam
Unauthorised access (Aug  6) SRC=170.0.155.219 LEN=44 TTL=48 ID=26693 TCP DPT=8080 WINDOW=23054 SYN 
Unauthorised access (Aug  6) SRC=170.0.155.219 LEN=44 TTL=48 ID=10758 TCP DPT=8080 WINDOW=23054 SYN 
Unauthorised access (Aug  4) SRC=170.0.155.219 LEN=44 TTL=48 ID=47398 TCP DPT=8080 WINDOW=38903 SYN 
Unauthorised access (Aug  3) SRC=170.0.155.219 LEN=44 TTL=48 ID=31279 TCP DPT=8080 WINDOW=23054 SYN
2020-08-07 00:45:09
80.112.43.125 attackspambots
[Thu Aug 06 08:17:21 2020] - Syn Flood From IP: 80.112.43.125 Port: 54769
2020-08-07 00:40:34
190.101.208.147 attackspambots
Automatic report - XMLRPC Attack
2020-08-07 00:56:29
167.99.172.181 attack
Aug  6 16:33:15 ns3164893 sshd[23780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.172.181  user=root
Aug  6 16:33:17 ns3164893 sshd[23780]: Failed password for root from 167.99.172.181 port 40300 ssh2
...
2020-08-07 00:39:07
190.223.26.38 attack
Aug  6 16:27:00 vps647732 sshd[11058]: Failed password for root from 190.223.26.38 port 22001 ssh2
...
2020-08-07 00:16:51
110.16.76.213 attack
2020-08-06T16:03:16.089940amanda2.illicoweb.com sshd\[23321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.16.76.213  user=root
2020-08-06T16:03:17.926565amanda2.illicoweb.com sshd\[23321\]: Failed password for root from 110.16.76.213 port 37288 ssh2
2020-08-06T16:07:50.066001amanda2.illicoweb.com sshd\[24364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.16.76.213  user=root
2020-08-06T16:07:52.188140amanda2.illicoweb.com sshd\[24364\]: Failed password for root from 110.16.76.213 port 5703 ssh2
2020-08-06T16:12:29.535920amanda2.illicoweb.com sshd\[25451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.16.76.213  user=root
...
2020-08-07 00:14:21
177.73.28.199 attackbots
Aug  6 18:07:42 ns381471 sshd[21164]: Failed password for root from 177.73.28.199 port 46156 ssh2
2020-08-07 00:38:42
144.217.190.197 attackspam
xmlrpc attack
2020-08-07 00:40:13
222.186.30.35 attackspambots
Aug  6 18:44:05 minden010 sshd[32390]: Failed password for root from 222.186.30.35 port 13057 ssh2
Aug  6 18:44:14 minden010 sshd[32442]: Failed password for root from 222.186.30.35 port 35116 ssh2
Aug  6 18:44:16 minden010 sshd[32442]: Failed password for root from 222.186.30.35 port 35116 ssh2
...
2020-08-07 00:49:10
104.236.228.230 attack
(sshd) Failed SSH login from 104.236.228.230 (US/United States/-): 5 in the last 3600 secs
2020-08-07 00:23:26
167.99.99.10 attack
2020-08-06T14:01:04.556592shield sshd\[25027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.99.10  user=root
2020-08-06T14:01:06.940341shield sshd\[25027\]: Failed password for root from 167.99.99.10 port 38850 ssh2
2020-08-06T14:03:30.798930shield sshd\[25227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.99.10  user=root
2020-08-06T14:03:32.891756shield sshd\[25227\]: Failed password for root from 167.99.99.10 port 50142 ssh2
2020-08-06T14:06:00.042577shield sshd\[25386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.99.10  user=root
2020-08-07 00:48:15
82.118.236.186 attackbotsspam
Failed password for root from 82.118.236.186 port 44346 ssh2
2020-08-07 00:47:14
222.186.175.182 attackspambots
Aug  6 13:11:56 firewall sshd[15529]: Failed password for root from 222.186.175.182 port 19988 ssh2
Aug  6 13:11:59 firewall sshd[15529]: Failed password for root from 222.186.175.182 port 19988 ssh2
Aug  6 13:12:03 firewall sshd[15529]: Failed password for root from 222.186.175.182 port 19988 ssh2
...
2020-08-07 00:15:11
106.12.20.3 attack
Aug  6 16:54:53 santamaria sshd\[1811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.20.3  user=root
Aug  6 16:54:54 santamaria sshd\[1811\]: Failed password for root from 106.12.20.3 port 53426 ssh2
Aug  6 16:59:32 santamaria sshd\[1838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.20.3  user=root
...
2020-08-07 00:50:01

Recently Reported IPs

141.136.41.55 141.136.41.36 141.136.42.142 141.136.41.65
141.136.43.120 141.136.43.139 141.136.43.47 141.136.43.69
141.136.43.49 141.136.43.63 141.136.47.101 141.136.89.224
141.136.91.226 141.138.136.200 141.138.138.198 141.138.139.95
141.138.142.253 141.138.141.99 141.138.168.121 141.138.168.119