Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.137.128.0 - 112.137.143.255'

% Abuse contact for '112.137.128.0 - 112.137.143.255' is 'hm-changed@vnnic.vn'

inetnum:        112.137.128.0 - 112.137.143.255
netname:        VNU-VN
descr:          VietNam National University Ha Noi
descr:          No 144, Xuan Thuy street, Cau Giay district, Ha Noi City
country:        VN
admin-c:        HSL20-AP
tech-c:         NTT39-AP
status:         ASSIGNED PORTABLE
remarks:        send spam and abuse report to hainn@vnu.edu.vn
mnt-by:         MAINT-VN-VNNIC
mnt-irt:        IRT-VNNIC-AP
mnt-routes:     MAINT-VN-VNNIC
last-modified:  2023-04-18T07:42:57Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-21T02:07:47Z
source:         APNIC

person:         Ho Sy Loi
address:        VNU-VN
country:        VN
phone:          +84-889596688
e-mail:         hsloi@vnu.edu.vn
nic-hdl:        HSL20-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2023-04-18T07:37:10Z
source:         APNIC

person:         Nguyen Thanh Tung
address:        VNU-VN
country:        VN
phone:          +84-904660058
e-mail:         tungtt@vnu.edu.vn
nic-hdl:        NTT39-AP
mnt-by:         MAINT-VN-VNNIC
last-modified:  2023-04-18T07:41:40Z
source:         APNIC

% Information related to '112.137.143.0/24AS45542'

route:          112.137.143.0/24
descr:          VNU-VN
origin:         AS45542
mnt-by:         MAINT-VN-VNNIC
last-modified:  2024-08-21T10:38:23Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.137.143.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.137.143.130.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 19:31:34 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 130.143.137.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.143.137.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.151.216.252 attackbotsspam
Lines containing failures of 201.151.216.252
Apr  8 21:11:05 dns01 sshd[7569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.151.216.252  user=nagios
Apr  8 21:11:07 dns01 sshd[7569]: Failed password for nagios from 201.151.216.252 port 54616 ssh2
Apr  8 21:11:07 dns01 sshd[7569]: Received disconnect from 201.151.216.252 port 54616:11: Bye Bye [preauth]
Apr  8 21:11:07 dns01 sshd[7569]: Disconnected from authenticating user nagios 201.151.216.252 port 54616 [preauth]
Apr  8 21:28:46 dns01 sshd[11569]: Invalid user devops from 201.151.216.252 port 45946
Apr  8 21:28:46 dns01 sshd[11569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.151.216.252
Apr  8 21:28:48 dns01 sshd[11569]: Failed password for invalid user devops from 201.151.216.252 port 45946 ssh2
Apr  8 21:28:48 dns01 sshd[11569]: Received disconnect from 201.151.216.252 port 45946:11: Bye Bye [preauth]
Apr  8 21:28:48 dns0........
------------------------------
2020-04-10 00:21:15
36.70.51.171 attackspambots
Unauthorized connection attempt from IP address 36.70.51.171 on Port 445(SMB)
2020-04-10 00:54:13
217.30.255.242 attack
Unauthorized connection attempt from IP address 217.30.255.242 on Port 445(SMB)
2020-04-10 00:46:24
209.97.182.62 attackbots
" "
2020-04-10 01:13:52
49.88.112.55 attackbotsspam
Apr  9 12:57:26 plusreed sshd[10339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Apr  9 12:57:28 plusreed sshd[10339]: Failed password for root from 49.88.112.55 port 30972 ssh2
...
2020-04-10 01:04:03
120.79.211.86 attackbots
"Restricted File Access Attempt - Matched Data: wp-config.php found within REQUEST_FILENAME: /wp-config.php5"
2020-04-10 01:07:19
82.62.153.15 attackbots
Apr  9 16:03:45 marvibiene sshd[27199]: Invalid user btc from 82.62.153.15 port 54795
Apr  9 16:03:45 marvibiene sshd[27199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.62.153.15
Apr  9 16:03:45 marvibiene sshd[27199]: Invalid user btc from 82.62.153.15 port 54795
Apr  9 16:03:47 marvibiene sshd[27199]: Failed password for invalid user btc from 82.62.153.15 port 54795 ssh2
...
2020-04-10 00:50:58
106.13.5.134 attackspam
Feb 13 16:12:08 woltan sshd[23122]: Failed password for invalid user ventas from 106.13.5.134 port 60140 ssh2
2020-04-10 00:59:44
114.237.194.6 attackspam
SpamScore above: 10.0
2020-04-10 00:44:39
64.227.13.104 attackbots
Apr  9 15:38:54 vpn01 sshd[17970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.13.104
Apr  9 15:38:56 vpn01 sshd[17970]: Failed password for invalid user robert from 64.227.13.104 port 58080 ssh2
...
2020-04-10 00:36:16
187.18.175.49 attackspam
Unauthorized connection attempt from IP address 187.18.175.49 on Port 445(SMB)
2020-04-10 00:22:43
183.134.91.53 attackspambots
Apr  9 15:00:51  sshd\[8637\]: Invalid user user from 183.134.91.53Apr  9 15:00:53  sshd\[8637\]: Failed password for invalid user user from 183.134.91.53 port 39716 ssh2
...
2020-04-10 01:16:10
192.241.175.48 attackspam
Apr  9 16:38:30 [host] sshd[14687]: Invalid user e
Apr  9 16:38:30 [host] sshd[14687]: pam_unix(sshd:
Apr  9 16:38:33 [host] sshd[14687]: Failed passwor
2020-04-10 00:48:20
193.242.195.222 attackspam
Unauthorized connection attempt from IP address 193.242.195.222 on Port 445(SMB)
2020-04-10 00:55:45
82.166.181.43 attackspambots
Unauthorized connection attempt from IP address 82.166.181.43 on Port 445(SMB)
2020-04-10 00:52:32

Recently Reported IPs

14.207.194.172 81.19.219.233 5.226.140.74 5.226.140.109
194.50.235.150 35.93.87.168 2606:4700:10::6814:5485 2606:4700:10::6814:4472
2606:4700:10::6814:5337 2606:4700:10::ac43:2335 20.169.106.62 183.206.96.146
62.162.113.34 198.98.56.217 142.248.80.190 170.9.16.186
42.200.230.143 146.70.194.246 2606:4700:10::6814:8566 2606:4700:10::6816:1605