Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.101.180.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.101.180.140.		IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:09:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 140.180.101.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.180.101.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.223.19 attack
Jan 22 14:09:37 firewall sshd[23681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.223.19  user=root
Jan 22 14:09:39 firewall sshd[23681]: Failed password for root from 106.13.223.19 port 33728 ssh2
Jan 22 14:12:32 firewall sshd[23728]: Invalid user svnadmin from 106.13.223.19
...
2020-01-23 15:45:56
185.216.140.27 attackspambots
Jan 23 08:20:21 debian-2gb-nbg1-2 kernel: \[2023300.510653\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.216.140.27 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10031 PROTO=TCP SPT=53147 DPT=12311 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-23 15:26:30
211.254.214.150 attackbots
Unauthorized connection attempt detected from IP address 211.254.214.150 to port 2220 [J]
2020-01-23 15:44:25
49.88.112.66 attackspambots
Jan 23 07:29:30 game-panel sshd[14693]: Failed password for root from 49.88.112.66 port 46720 ssh2
Jan 23 07:29:32 game-panel sshd[14693]: Failed password for root from 49.88.112.66 port 46720 ssh2
Jan 23 07:29:34 game-panel sshd[14693]: Failed password for root from 49.88.112.66 port 46720 ssh2
2020-01-23 15:43:16
185.209.0.91 attackbotsspam
firewall-block, port(s): 4999/tcp
2020-01-23 15:34:53
177.189.244.193 attackbotsspam
2020-01-23T07:44:52.570873abusebot-3.cloudsearch.cf sshd[27873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193  user=root
2020-01-23T07:44:54.367771abusebot-3.cloudsearch.cf sshd[27873]: Failed password for root from 177.189.244.193 port 43689 ssh2
2020-01-23T07:49:41.631903abusebot-3.cloudsearch.cf sshd[28160]: Invalid user sentry from 177.189.244.193 port 32894
2020-01-23T07:49:41.640587abusebot-3.cloudsearch.cf sshd[28160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.244.193
2020-01-23T07:49:41.631903abusebot-3.cloudsearch.cf sshd[28160]: Invalid user sentry from 177.189.244.193 port 32894
2020-01-23T07:49:43.778643abusebot-3.cloudsearch.cf sshd[28160]: Failed password for invalid user sentry from 177.189.244.193 port 32894 ssh2
2020-01-23T07:53:04.061447abusebot-3.cloudsearch.cf sshd[28331]: Invalid user qq from 177.189.244.193 port 46973
...
2020-01-23 15:55:58
113.28.150.75 attackbotsspam
Invalid user deploy2 from 113.28.150.75 port 62209
2020-01-23 15:50:05
222.186.175.140 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
Failed password for root from 222.186.175.140 port 56472 ssh2
2020-01-23 15:40:30
202.116.237.20 attack
Unauthorized connection attempt detected from IP address 202.116.237.20 to port 2220 [J]
2020-01-23 15:22:40
172.111.134.20 attackspambots
Jan 22 07:09:06 php1 sshd\[15492\]: Invalid user system from 172.111.134.20
Jan 22 07:09:06 php1 sshd\[15492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.134.20
Jan 22 07:09:08 php1 sshd\[15492\]: Failed password for invalid user system from 172.111.134.20 port 57958 ssh2
Jan 22 07:12:45 php1 sshd\[15982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.111.134.20  user=root
Jan 22 07:12:48 php1 sshd\[15982\]: Failed password for root from 172.111.134.20 port 56828 ssh2
2020-01-23 15:39:49
51.38.37.128 attack
Unauthorized connection attempt detected from IP address 51.38.37.128 to port 2220 [J]
2020-01-23 15:47:14
159.65.41.104 attack
"SSH brute force auth login attempt."
2020-01-23 15:59:49
45.143.222.145 attackspam
Attempts against SMTP/SSMTP
2020-01-23 15:45:45
179.189.246.102 attackbots
Fail2Ban Ban Triggered
2020-01-23 15:27:59
200.146.215.26 attack
Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-23 15:33:01

Recently Reported IPs

113.101.212.52 113.101.251.245 113.101.252.99 113.101.85.142
113.101.87.59 113.102.128.125 113.101.85.211 113.102.128.21
113.102.128.99 113.101.86.74 113.102.131.117 113.102.146.204
113.102.192.57 113.102.204.192 113.110.35.189 113.111.181.148
113.111.21.215 113.111.184.87 113.111.184.91 113.111.23.131