Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Xushan

Region: Zhejiang

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: China Mobile communications corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.13.196.43 attackspam
Automatic report - Port Scan Attack
2019-07-16 15:14:24
112.13.196.21 attackbots
port scan and connect, tcp 23 (telnet)
2019-06-23 11:38:46
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.13.196.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33526
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.13.196.34.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 21 20:02:36 CST 2019
;; MSG SIZE  rcvd: 117

Host info
34.196.13.112.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 34.196.13.112.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
61.140.131.178 attackspambots
Unauthorized connection attempt detected from IP address 61.140.131.178 to port 445
2020-01-02 21:00:33
103.66.210.203 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-02 21:12:03
106.13.162.168 attackbotsspam
Unauthorized connection attempt detected from IP address 106.13.162.168 to port 23
2020-01-02 21:11:38
42.117.24.21 attackbotsspam
Unauthorized connection attempt detected from IP address 42.117.24.21 to port 23
2020-01-02 21:01:11
148.72.65.10 attackspambots
Jan  2 08:25:12 lnxweb61 sshd[3465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.65.10
2020-01-02 21:10:40
42.113.95.121 attackbotsspam
Unauthorized connection attempt detected from IP address 42.113.95.121 to port 23
2020-01-02 21:01:34
106.75.106.221 attackspam
Unauthorized connection attempt detected from IP address 106.75.106.221 to port 8443
2020-01-02 21:22:24
60.176.228.8 attackbots
Unauthorized connection attempt detected from IP address 60.176.228.8 to port 8118
2020-01-02 21:23:54
52.34.195.239 attack
01/02/2020-14:07:33.640138 52.34.195.239 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-02 21:12:26
164.52.24.172 attack
Scanning random ports - tries to find possible vulnerable services
2020-01-02 21:10:20
42.113.229.149 attack
Unauthorized connection attempt detected from IP address 42.113.229.149 to port 23
2020-01-02 20:52:26
51.83.46.16 attackspambots
Jan  2 12:08:24 herz-der-gamer sshd[21575]: Invalid user nfs from 51.83.46.16 port 43950
Jan  2 12:08:24 herz-der-gamer sshd[21575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.46.16
Jan  2 12:08:24 herz-der-gamer sshd[21575]: Invalid user nfs from 51.83.46.16 port 43950
Jan  2 12:08:26 herz-der-gamer sshd[21575]: Failed password for invalid user nfs from 51.83.46.16 port 43950 ssh2
...
2020-01-02 21:12:44
78.109.137.121 attackspam
Unauthorized connection attempt detected from IP address 78.109.137.121 to port 80
2020-01-02 20:59:25
42.117.213.127 attack
Unauthorized connection attempt detected from IP address 42.117.213.127 to port 23
2020-01-02 21:24:43
223.152.200.122 attackbotsspam
Unauthorized connection attempt detected from IP address 223.152.200.122 to port 81
2020-01-02 20:53:44

Recently Reported IPs

128.249.128.209 73.123.148.139 65.251.164.94 226.114.155.109
118.9.224.37 151.138.59.62 57.164.157.94 124.106.58.70
222.217.91.199 133.81.209.81 218.164.58.233 195.161.225.167
77.220.74.124 216.10.216.64 101.98.109.127 27.84.35.204
105.110.249.238 156.29.145.33 94.199.120.58 205.162.201.64