Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: ‘Aiea

Region: Hawaii

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       141.239.0.0 - 141.239.255.255
CIDR:           141.239.0.0/16
NetName:        HAWAIIAN-TELCOM-SERVICES-COMPANY-INC-2
NetHandle:      NET-141-239-0-0-1
Parent:         RIPE-ERX-141 (NET-141-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Hawaiian Telcom Services Company, Inc. (HAWAI-3)
RegDate:        1990-08-10
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/141.239.0.0



OrgName:        Hawaiian Telcom Services Company, Inc.
OrgId:          HAWAI-3
Address:        1177 Bishop St.
City:           Honolulu
StateProv:      HI
PostalCode:     96813
Country:        US
RegDate:        2005-07-19
Updated:        2024-11-25
Comment:        FOR ABUSE, SECURITY, SPAM -- EMAIL abuse@hawaiiantel.net ONLY
Comment:        DO NOT SEND E-MAIL TO inengineering@hawaiiantel.net AS IT WILL NOT BE READ OR ANSWERED.
Comment:        Include IP address, time/date, message header and attack logs.
Ref:            https://rdap.arin.net/registry/entity/HAWAI-3

ReferralServer:  rwhois://rwhois.hawaiiantel.net:4321

OrgTechHandle: ISPOP2-ARIN
OrgTechName:   ISP OPERATIONS
OrgTechPhone:  +1-808-643-3662 
OrgTechEmail:  inengineering@hawaiiantel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ISPOP2-ARIN

OrgTechHandle: SWE36-ARIN
OrgTechName:   Weeks, Scott 
OrgTechPhone:  +1-808-546-7100 
OrgTechEmail:  scott.weeks@hawaiiantel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SWE36-ARIN

OrgAbuseHandle: SECUR21-ARIN
OrgAbuseName:   Security
OrgAbusePhone:  +1-808-643-7111 
OrgAbuseEmail:  abuse@hawaiiantel.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SECUR21-ARIN

# end


# start

NetRange:       141.239.0.0 - 141.239.255.255
CIDR:           141.239.0.0/16
NetName:        HT-NET-141-239-0-0
NetHandle:      NET-141-239-0-0-2
Parent:         HAWAIIAN-TELCOM-SERVICES-COMPANY-INC-2 (NET-141-239-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       HAWAIIAN TELCOM (C09769311)
RegDate:        2023-07-05
Updated:        2023-07-05
Ref:            https://rdap.arin.net/registry/ip/141.239.0.0



CustName:       HAWAIIAN TELCOM
Address:        1177 BISHOP STREET
City:           HONOLULU
StateProv:      HI
PostalCode:     96813
Country:        US
RegDate:        2023-07-05
Updated:        2023-07-05
Ref:            https://rdap.arin.net/registry/entity/C09769311

OrgTechHandle: ISPOP2-ARIN
OrgTechName:   ISP OPERATIONS
OrgTechPhone:  +1-808-643-3662 
OrgTechEmail:  inengineering@hawaiiantel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ISPOP2-ARIN

OrgTechHandle: SWE36-ARIN
OrgTechName:   Weeks, Scott 
OrgTechPhone:  +1-808-546-7100 
OrgTechEmail:  scott.weeks@hawaiiantel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SWE36-ARIN

OrgAbuseHandle: SECUR21-ARIN
OrgAbuseName:   Security
OrgAbusePhone:  +1-808-643-7111 
OrgAbuseEmail:  abuse@hawaiiantel.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SECUR21-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.hawaiiantel.net:4321.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.239.76.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.239.76.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 18:06:22 CST 2026
;; MSG SIZE  rcvd: 107
Host info
145.76.239.141.in-addr.arpa domain name pointer dhcp-141-239-76-145.hawaiiantel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.76.239.141.in-addr.arpa	name = dhcp-141-239-76-145.hawaiiantel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.206.233.198 attackspambots
Sep 29 13:39:35 ncomp postfix/smtpd[31086]: warning: unknown[218.206.233.198]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 13:39:50 ncomp postfix/smtpd[31086]: warning: unknown[218.206.233.198]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 13:40:05 ncomp postfix/smtpd[31086]: warning: unknown[218.206.233.198]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-30 02:32:39
124.158.12.202 attackspam
124.158.12.202 - - [29/Sep/2020:13:26:58 +0100] "POST /wp-login.php HTTP/1.1" 200 2201 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.158.12.202 - - [29/Sep/2020:13:27:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
124.158.12.202 - - [29/Sep/2020:13:27:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2255 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-30 01:59:48
107.117.169.128 attackbots
Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-icons54914e2ef10782de
2020-09-30 02:32:53
132.232.66.227 attackspambots
2020-09-28T07:16:27.632793correo.[domain] sshd[24427]: Invalid user vpn from 132.232.66.227 port 55772 2020-09-28T07:16:29.521468correo.[domain] sshd[24427]: Failed password for invalid user vpn from 132.232.66.227 port 55772 ssh2 2020-09-28T07:29:16.846222correo.[domain] sshd[25585]: Invalid user daniel from 132.232.66.227 port 43450 ...
2020-09-30 02:28:05
95.211.208.25 attackbotsspam
E-Mail Spam (RBL) [REJECTED]
2020-09-30 02:15:40
14.99.176.210 attack
2020-09-29T21:34:48.054179paragon sshd[514866]: Invalid user list from 14.99.176.210 port 26662
2020-09-29T21:34:48.057873paragon sshd[514866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.176.210
2020-09-29T21:34:48.054179paragon sshd[514866]: Invalid user list from 14.99.176.210 port 26662
2020-09-29T21:34:50.245636paragon sshd[514866]: Failed password for invalid user list from 14.99.176.210 port 26662 ssh2
2020-09-29T21:36:37.516907paragon sshd[514914]: Invalid user netdump from 14.99.176.210 port 49965
...
2020-09-30 02:17:28
42.194.203.226 attackbots
Sep 29 20:01:23 inter-technics sshd[7527]: Invalid user admin from 42.194.203.226 port 34800
Sep 29 20:01:23 inter-technics sshd[7527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.203.226
Sep 29 20:01:23 inter-technics sshd[7527]: Invalid user admin from 42.194.203.226 port 34800
Sep 29 20:01:25 inter-technics sshd[7527]: Failed password for invalid user admin from 42.194.203.226 port 34800 ssh2
Sep 29 20:05:46 inter-technics sshd[7719]: Invalid user edward from 42.194.203.226 port 54100
...
2020-09-30 02:19:56
141.98.10.214 attackspam
Sep 29 12:45:55 plusreed sshd[6624]: Invalid user admin from 141.98.10.214
...
2020-09-30 01:57:42
36.110.217.140 attackbotsspam
Sep 29 14:59:44 vps647732 sshd[8689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.217.140
Sep 29 14:59:46 vps647732 sshd[8689]: Failed password for invalid user git from 36.110.217.140 port 32996 ssh2
...
2020-09-30 02:09:01
117.107.213.245 attack
Invalid user h from 117.107.213.245 port 35618
2020-09-30 02:01:12
68.183.236.92 attackbotsspam
Invalid user git from 68.183.236.92 port 60604
2020-09-30 02:01:55
103.208.152.184 attackbots
Telnet Server BruteForce Attack
2020-09-30 02:12:47
188.165.230.118 attackbotsspam
20 attempts against mh-misbehave-ban on comet
2020-09-30 02:25:14
139.59.7.177 attackspam
Sep 29 12:58:07 scw-focused-cartwright sshd[14311]: Failed password for root from 139.59.7.177 port 60342 ssh2
Sep 29 13:02:59 scw-focused-cartwright sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177
2020-09-30 02:02:58
200.125.248.192 attackbotsspam
Sep 28 22:33:34 mellenthin postfix/smtpd[8520]: NOQUEUE: reject: RCPT from unknown[200.125.248.192]: 554 5.7.1 Service unavailable; Client host [200.125.248.192] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/200.125.248.192; from= to= proto=ESMTP helo=<192.248.125.200.static.anycast.cnt-grms.ec>
2020-09-30 02:15:29

Recently Reported IPs

210.87.110.72 36.70.99.75 91.231.89.231 91.231.89.159
134.35.157.57 2606:4700:10::6816:2916 2606:4700:10::6816:2604 2606:4700:10::6814:9007
2606:4700:10::6814:9859 2606:4700:10::6814:5181 2606:4700:10::6814:4672 2606:4700:10::6814:6995
2606:4700:10::6816:765 2606:4700:10::6814:7326 97.76.235.129 207.97.145.130
2606:4700:10::6816:465 2606:4700:10::6814:6758 2606:4700:10::ac43:2345 2606:4700:10::6814:8402