Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Croatia (LOCAL Name: Hrvatska)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.138.41.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.138.41.142.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:37:29 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.41.138.141.in-addr.arpa domain name pointer 141-138-41-142.dsl.iskon.hr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.41.138.141.in-addr.arpa	name = 141-138-41-142.dsl.iskon.hr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.160.100.14 attack
Invalid user ethos from 221.160.100.14 port 39686
2019-10-24 23:26:46
157.230.177.161 attack
Oct 24 05:30:46 web9 sshd\[9676\]: Invalid user user from 157.230.177.161
Oct 24 05:30:46 web9 sshd\[9676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.177.161
Oct 24 05:30:48 web9 sshd\[9676\]: Failed password for invalid user user from 157.230.177.161 port 34816 ssh2
Oct 24 05:31:20 web9 sshd\[9765\]: Invalid user user from 157.230.177.161
Oct 24 05:31:20 web9 sshd\[9765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.177.161
2019-10-24 23:41:30
51.38.238.205 attackbotsspam
Invalid user admin from 51.38.238.205 port 57470
2019-10-24 23:19:38
221.150.15.200 attackspambots
Invalid user pi from 221.150.15.200 port 57594
2019-10-24 23:27:15
54.37.158.218 attackspambots
Invalid user talita from 54.37.158.218 port 56613
2019-10-25 00:01:01
117.50.45.254 attack
Invalid user km from 117.50.45.254 port 37018
2019-10-24 23:50:42
149.202.164.82 attackbotsspam
Invalid user fleurs from 149.202.164.82 port 48078
2019-10-24 23:43:39
138.68.48.118 attackspambots
Oct 24 16:24:08 ovpn sshd\[2980\]: Invalid user oy from 138.68.48.118
Oct 24 16:24:08 ovpn sshd\[2980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118
Oct 24 16:24:10 ovpn sshd\[2980\]: Failed password for invalid user oy from 138.68.48.118 port 55970 ssh2
Oct 24 16:39:00 ovpn sshd\[5832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.48.118  user=root
Oct 24 16:39:02 ovpn sshd\[5832\]: Failed password for root from 138.68.48.118 port 43120 ssh2
2019-10-24 23:45:31
59.25.197.162 attack
Invalid user jeff from 59.25.197.162 port 60856
2019-10-25 00:00:10
31.27.38.242 attack
Invalid user bp from 31.27.38.242 port 42414
2019-10-24 23:25:07
154.92.195.18 attackbots
Oct 24 16:57:28 vpn01 sshd[19411]: Failed password for root from 154.92.195.18 port 34606 ssh2
...
2019-10-24 23:42:03
45.55.86.19 attack
Invalid user ws from 45.55.86.19 port 57100
2019-10-25 00:03:35
151.101.12.215 attackspam
10/24/2019-13:59:11.101596 151.101.12.215 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-24 23:43:04
180.64.71.114 attackspambots
SSH bruteforce
2019-10-24 23:36:28
37.120.33.30 attack
Oct 24 05:04:01 hpm sshd\[29364\]: Invalid user cs from 37.120.33.30
Oct 24 05:04:01 hpm sshd\[29364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.33.30
Oct 24 05:04:03 hpm sshd\[29364\]: Failed password for invalid user cs from 37.120.33.30 port 36024 ssh2
Oct 24 05:07:58 hpm sshd\[29676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.120.33.30  user=root
Oct 24 05:08:01 hpm sshd\[29676\]: Failed password for root from 37.120.33.30 port 54857 ssh2
2019-10-24 23:22:56

Recently Reported IPs

18.207.156.228 138.255.150.49 104.34.178.134 210.86.164.204
103.195.26.224 39.130.116.154 139.198.170.80 43.132.109.141
202.164.139.165 85.174.196.169 31.59.226.103 83.4.209.63
102.89.3.86 197.33.190.215 27.75.195.202 196.245.163.207
68.183.192.74 103.109.75.229 77.26.70.118 101.35.138.55