Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ushiku

Region: Ibaraki

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.138.11.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.138.11.120.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:13:27 CST 2024
;; MSG SIZE  rcvd: 107
Host info
120.11.138.112.in-addr.arpa domain name pointer 120.net112138011.t-com.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.11.138.112.in-addr.arpa	name = 120.net112138011.t-com.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.53.37.252 attackbotsspam
1584709597 - 03/20/2020 14:06:37 Host: 1.53.37.252/1.53.37.252 Port: 445 TCP Blocked
2020-03-21 04:06:02
213.74.85.54 attack
C1,WP GET /wp-login.php
2020-03-21 04:13:46
89.39.73.12 attack
Automatic report - Port Scan Attack
2020-03-21 04:01:00
194.182.75.170 attackbotsspam
194.182.75.170 - - [20/Mar/2020:14:06:21 +0100] "GET /wp-login.php HTTP/1.1" 200 5844 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.182.75.170 - - [20/Mar/2020:14:06:22 +0100] "POST /wp-login.php HTTP/1.1" 200 6743 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
194.182.75.170 - - [20/Mar/2020:14:06:23 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-21 04:13:08
43.242.241.218 attackspambots
Mar 20 18:28:12 [host] sshd[404]: Invalid user of 
Mar 20 18:28:12 [host] sshd[404]: pam_unix(sshd:au
Mar 20 18:28:14 [host] sshd[404]: Failed password
2020-03-21 04:22:02
36.27.84.138 attackspambots
2020-03-20T20:01:45.882161ionos.janbro.de sshd[87057]: Invalid user ji from 36.27.84.138 port 43656
2020-03-20T20:01:48.003709ionos.janbro.de sshd[87057]: Failed password for invalid user ji from 36.27.84.138 port 43656 ssh2
2020-03-20T20:05:00.967430ionos.janbro.de sshd[87099]: Invalid user gk from 36.27.84.138 port 43680
2020-03-20T20:05:01.404974ionos.janbro.de sshd[87099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.27.84.138
2020-03-20T20:05:00.967430ionos.janbro.de sshd[87099]: Invalid user gk from 36.27.84.138 port 43680
2020-03-20T20:05:04.273335ionos.janbro.de sshd[87099]: Failed password for invalid user gk from 36.27.84.138 port 43680 ssh2
2020-03-20T20:08:31.286403ionos.janbro.de sshd[87123]: Invalid user r00t from 36.27.84.138 port 43732
2020-03-20T20:08:31.636065ionos.janbro.de sshd[87123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.27.84.138
2020-03-20T20:08:31.286403ionos.janb
...
2020-03-21 04:29:04
111.175.58.157 attack
Fail2Ban Ban Triggered
2020-03-21 04:28:50
45.133.99.13 attackspam
2020-03-20T19:30:57.187963l03.customhost.org.uk postfix/smtps/smtpd[19045]: warning: unknown[45.133.99.13]: SASL LOGIN authentication failed: authentication failure
2020-03-20T19:31:03.454246l03.customhost.org.uk postfix/smtps/smtpd[19045]: warning: unknown[45.133.99.13]: SASL LOGIN authentication failed: authentication failure
2020-03-20T19:39:01.730769l03.customhost.org.uk postfix/smtps/smtpd[20659]: warning: unknown[45.133.99.13]: SASL LOGIN authentication failed: authentication failure
2020-03-20T19:39:09.502659l03.customhost.org.uk postfix/smtps/smtpd[20659]: warning: unknown[45.133.99.13]: SASL LOGIN authentication failed: authentication failure
...
2020-03-21 03:56:11
122.51.162.201 attack
Mar 20 13:57:38 v22019038103785759 sshd\[18894\]: Invalid user sony from 122.51.162.201 port 38544
Mar 20 13:57:38 v22019038103785759 sshd\[18894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.162.201
Mar 20 13:57:40 v22019038103785759 sshd\[18894\]: Failed password for invalid user sony from 122.51.162.201 port 38544 ssh2
Mar 20 14:07:11 v22019038103785759 sshd\[19433\]: Invalid user cut from 122.51.162.201 port 46126
Mar 20 14:07:11 v22019038103785759 sshd\[19433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.162.201
...
2020-03-21 03:50:54
150.109.17.222 attackspam
2020-03-19 19:24:26 server sshd[26527]: Failed password for invalid user odroid from 150.109.17.222 port 55386 ssh2
2020-03-21 04:02:19
203.120.124.154 attackspam
Automatic report - Port Scan Attack
2020-03-21 04:00:22
192.141.68.18 attack
Mar 20 13:14:16 askasleikir sshd[81778]: Failed password for invalid user test from 192.141.68.18 port 33989 ssh2
2020-03-21 03:59:54
103.207.39.243 attackspambots
Lines containing failures of 103.207.39.243
Mar 18 08:16:10 neweola postfix/smtpd[14708]: connect from unknown[103.207.39.243]
Mar 18 08:16:11 neweola postfix/smtpd[14708]: lost connection after AUTH from unknown[103.207.39.243]
Mar 18 08:16:11 neweola postfix/smtpd[14708]: disconnect from unknown[103.207.39.243] ehlo=1 auth=0/1 commands=1/2
Mar 18 08:16:11 neweola postfix/smtpd[14708]: connect from unknown[103.207.39.243]
Mar 18 08:16:12 neweola postfix/smtpd[14708]: lost connection after AUTH from unknown[103.207.39.243]
Mar 18 08:16:12 neweola postfix/smtpd[14708]: disconnect from unknown[103.207.39.243] ehlo=1 auth=0/1 commands=1/2
Mar 18 08:16:12 neweola postfix/smtpd[14708]: connect from unknown[103.207.39.243]
Mar 18 08:16:13 neweola postfix/smtpd[14708]: lost connection after AUTH from unknown[103.207.39.243]
Mar 18 08:16:13 neweola postfix/smtpd[14708]: disconnect from unknown[103.207.39.243] ehlo=1 auth=0/1 commands=1/2
Mar 18 08:16:13 neweola postfix/smtpd[147........
------------------------------
2020-03-21 03:54:30
54.37.149.233 attackspam
DATE:2020-03-20 20:59:22, IP:54.37.149.233, PORT:ssh SSH brute force auth (docker-dc)
2020-03-21 04:21:47
45.127.133.94 attack
Mar 20 18:37:50 vlre-nyc-1 sshd\[6458\]: Invalid user mfs from 45.127.133.94
Mar 20 18:37:50 vlre-nyc-1 sshd\[6458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.133.94
Mar 20 18:37:52 vlre-nyc-1 sshd\[6458\]: Failed password for invalid user mfs from 45.127.133.94 port 43864 ssh2
Mar 20 18:45:11 vlre-nyc-1 sshd\[6859\]: Invalid user teamspeak3-server from 45.127.133.94
Mar 20 18:45:11 vlre-nyc-1 sshd\[6859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.133.94
...
2020-03-21 04:30:04

Recently Reported IPs

112.137.92.157 112.138.36.16 112.137.86.243 112.138.121.167
112.137.72.61 112.137.55.252 112.138.122.198 112.137.30.253
112.137.80.223 112.137.44.124 112.138.155.92 112.137.50.232
112.138.195.240 112.137.65.224 112.137.239.140 112.137.234.83
112.137.52.41 112.137.40.181 112.137.227.233 112.137.66.74