Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.13.90.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.13.90.242.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052001 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 21 03:42:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.90.13.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 112.13.90.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.70.84.4 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-10 03:40:32
111.231.81.129 attack
Apr  9 19:01:12 ncomp sshd[21214]: Invalid user charles from 111.231.81.129
Apr  9 19:01:12 ncomp sshd[21214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.81.129
Apr  9 19:01:12 ncomp sshd[21214]: Invalid user charles from 111.231.81.129
Apr  9 19:01:14 ncomp sshd[21214]: Failed password for invalid user charles from 111.231.81.129 port 55126 ssh2
2020-04-10 03:20:51
46.38.145.4 attackspambots
Apr  9 19:58:06 mail postfix/smtpd\[31324\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr  9 20:28:27 mail postfix/smtpd\[32290\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr  9 20:28:57 mail postfix/smtpd\[32289\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Apr  9 20:29:27 mail postfix/smtpd\[32290\]: warning: unknown\[46.38.145.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-04-10 03:12:23
218.92.0.165 attackspambots
Apr 10 02:21:55 webhost01 sshd[462]: Failed password for root from 218.92.0.165 port 4075 ssh2
Apr 10 02:22:04 webhost01 sshd[462]: Failed password for root from 218.92.0.165 port 4075 ssh2
...
2020-04-10 03:27:06
59.46.70.107 attackspam
Apr  9 20:01:33 prod4 sshd\[28319\]: Invalid user mysql1 from 59.46.70.107
Apr  9 20:01:35 prod4 sshd\[28319\]: Failed password for invalid user mysql1 from 59.46.70.107 port 43376 ssh2
Apr  9 20:07:13 prod4 sshd\[30136\]: Invalid user kernoops from 59.46.70.107
...
2020-04-10 03:16:42
77.42.118.149 attackspambots
Automatic report - Port Scan Attack
2020-04-10 03:33:47
182.151.23.170 attack
Unauthorized connection attempt detected from IP address 182.151.23.170 to port 6379
2020-04-10 03:30:00
76.214.112.45 attackbotsspam
Apr  9 17:39:38 jupiter sshd[11796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.214.112.45
Apr  9 17:39:40 jupiter sshd[11796]: Failed password for invalid user time from 76.214.112.45 port 24532 ssh2
...
2020-04-10 03:16:25
151.80.41.64 attack
$lgm
2020-04-10 03:17:13
111.67.199.98 attackspambots
[ssh] SSH attack
2020-04-10 03:30:15
169.57.207.243 attackspam
Brute force attempt
2020-04-10 03:20:32
122.51.89.18 attackspam
Apr  9 21:03:33 vps333114 sshd[3005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.89.18
Apr  9 21:03:35 vps333114 sshd[3005]: Failed password for invalid user user from 122.51.89.18 port 35004 ssh2
...
2020-04-10 03:29:02
121.142.87.218 attack
Apr  9 21:16:51 h2779839 sshd[4926]: Invalid user teampspeak3 from 121.142.87.218 port 35834
Apr  9 21:16:51 h2779839 sshd[4926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.87.218
Apr  9 21:16:51 h2779839 sshd[4926]: Invalid user teampspeak3 from 121.142.87.218 port 35834
Apr  9 21:16:53 h2779839 sshd[4926]: Failed password for invalid user teampspeak3 from 121.142.87.218 port 35834 ssh2
Apr  9 21:20:55 h2779839 sshd[5075]: Invalid user chef from 121.142.87.218 port 44724
Apr  9 21:20:55 h2779839 sshd[5075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.87.218
Apr  9 21:20:55 h2779839 sshd[5075]: Invalid user chef from 121.142.87.218 port 44724
Apr  9 21:20:56 h2779839 sshd[5075]: Failed password for invalid user chef from 121.142.87.218 port 44724 ssh2
Apr  9 21:24:53 h2779839 sshd[5198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.
...
2020-04-10 03:32:59
119.8.2.18 attackbotsspam
Unauthorized connection attempt detected from IP address 119.8.2.18 to port 23
2020-04-10 03:08:46
41.193.122.77 attackspambots
Apr  9 18:15:18 vserver sshd\[31993\]: Invalid user pi from 41.193.122.77Apr  9 18:15:18 vserver sshd\[31995\]: Invalid user pi from 41.193.122.77Apr  9 18:15:20 vserver sshd\[31995\]: Failed password for invalid user pi from 41.193.122.77 port 47966 ssh2Apr  9 18:15:20 vserver sshd\[31993\]: Failed password for invalid user pi from 41.193.122.77 port 47958 ssh2
...
2020-04-10 03:04:21

Recently Reported IPs

59.21.78.148 59.2.221.84 65.147.253.252 108.89.233.146
161.35.55.198 162.244.118.224 62.82.141.132 255.201.174.170
73.245.99.163 234.230.108.255 197.41.193.15 227.156.62.4
242.236.187.94 169.240.40.168 148.71.28.176 97.107.225.113
53.172.216.153 181.178.188.72 62.4.232.51 139.31.23.123