Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Udon Thani

Region: Udon Thani

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.93.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.93.113.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040101 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 01 19:48:27 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 113.93.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.93.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.247.99.38 attackbots
701 attempts to GET/POST various PHPs
2019-06-22 16:46:03
14.231.142.184 attackbots
Unauthorised access (Jun 22) SRC=14.231.142.184 LEN=52 TTL=116 ID=4729 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-22 17:11:51
119.29.67.90 attackspam
$f2bV_matches
2019-06-22 16:15:43
223.81.166.101 attack
firewall-block, port(s): 23/tcp
2019-06-22 16:44:55
94.29.124.37 attackspam
Unauthorized connection attempt from IP address 94.29.124.37 on Port 445(SMB)
2019-06-22 16:38:08
112.252.101.147 attackspam
firewall-block, port(s): 2323/tcp
2019-06-22 16:54:06
196.52.43.112 attack
" "
2019-06-22 17:12:26
31.46.16.95 attackspambots
Repeated brute force against a port
2019-06-22 16:36:25
191.53.57.255 attack
SMTP-sasl brute force
...
2019-06-22 16:46:26
82.151.123.235 attackbots
Unauthorized connection attempt from IP address 82.151.123.235 on Port 445(SMB)
2019-06-22 16:28:53
165.22.57.129 attackspambots
DATE:2019-06-22_06:30:34, IP:165.22.57.129, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 16:43:59
62.210.89.233 attack
¯\_(ツ)_/¯
2019-06-22 16:53:12
185.220.101.6 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.6  user=root
Failed password for root from 185.220.101.6 port 38308 ssh2
Failed password for root from 185.220.101.6 port 38308 ssh2
Failed password for root from 185.220.101.6 port 38308 ssh2
Failed password for root from 185.220.101.6 port 38308 ssh2
2019-06-22 16:32:16
62.102.148.68 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68  user=root
Failed password for root from 62.102.148.68 port 56144 ssh2
Failed password for root from 62.102.148.68 port 56144 ssh2
Failed password for root from 62.102.148.68 port 56144 ssh2
Failed password for root from 62.102.148.68 port 56144 ssh2
2019-06-22 16:26:22
129.205.140.149 attackbotsspam
3389BruteforceFW22
2019-06-22 17:10:38

Recently Reported IPs

1.20.88.40 1.200.183.71 1.201.151.68 1.202.102.69
1.202.112.151 1.202.112.242 1.202.112.47 1.202.113.147
1.202.162.16 1.202.35.82 1.202.75.99 1.202.81.67
1.203.173.30 1.203.240.28 1.204.109.121 1.204.11.212
1.204.128.124 1.204.148.17 1.204.173.196 1.204.178.124