Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.103.140.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.103.140.134.		IN	A

;; AUTHORITY SECTION:
.			204	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 16:39:58 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.140.103.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.140.103.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.190.51 attackbots
Invalid user user01 from 106.13.190.51 port 48264
2020-07-12 02:39:42
60.167.177.107 attack
Invalid user gomez from 60.167.177.107 port 51434
2020-07-12 02:46:27
45.88.13.206 attackspam
Jul  7 21:40:54 cumulus sshd[1770]: Invalid user cnctmp from 45.88.13.206 port 49164
Jul  7 21:40:54 cumulus sshd[1770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.13.206
Jul  7 21:40:56 cumulus sshd[1770]: Failed password for invalid user cnctmp from 45.88.13.206 port 49164 ssh2
Jul  7 21:40:57 cumulus sshd[1770]: Received disconnect from 45.88.13.206 port 49164:11: Bye Bye [preauth]
Jul  7 21:40:57 cumulus sshd[1770]: Disconnected from 45.88.13.206 port 49164 [preauth]
Jul  7 21:52:29 cumulus sshd[3031]: Invalid user yuan from 45.88.13.206 port 60084
Jul  7 21:52:29 cumulus sshd[3031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.13.206
Jul  7 21:52:31 cumulus sshd[3031]: Failed password for invalid user yuan from 45.88.13.206 port 60084 ssh2
Jul  7 21:52:32 cumulus sshd[3031]: Received disconnect from 45.88.13.206 port 60084:11: Bye Bye [preauth]
Jul  7 21:52:32 cumulu........
-------------------------------
2020-07-12 02:14:51
177.220.133.158 attack
Invalid user assos from 177.220.133.158 port 58163
2020-07-12 02:26:13
193.112.54.190 attack
2020-07-11T19:48:24+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-07-12 02:21:33
219.250.188.107 attack
2020-07-11T16:28:12.335287abusebot-8.cloudsearch.cf sshd[16044]: Invalid user zhangzhitong from 219.250.188.107 port 35568
2020-07-11T16:28:12.341715abusebot-8.cloudsearch.cf sshd[16044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.107
2020-07-11T16:28:12.335287abusebot-8.cloudsearch.cf sshd[16044]: Invalid user zhangzhitong from 219.250.188.107 port 35568
2020-07-11T16:28:14.728678abusebot-8.cloudsearch.cf sshd[16044]: Failed password for invalid user zhangzhitong from 219.250.188.107 port 35568 ssh2
2020-07-11T16:37:27.281709abusebot-8.cloudsearch.cf sshd[16054]: Invalid user adisadmin from 219.250.188.107 port 51914
2020-07-11T16:37:27.287784abusebot-8.cloudsearch.cf sshd[16054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.107
2020-07-11T16:37:27.281709abusebot-8.cloudsearch.cf sshd[16054]: Invalid user adisadmin from 219.250.188.107 port 51914
2020-07-11T16:37:29.197832ab
...
2020-07-12 02:18:03
138.255.0.27 attackspambots
Jul 11 20:24:30 server sshd[11508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.255.0.27
Jul 11 20:24:32 server sshd[11508]: Failed password for invalid user nisuser2 from 138.255.0.27 port 37858 ssh2
Jul 11 20:26:49 server sshd[11719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.255.0.27
...
2020-07-12 02:30:53
106.51.113.15 attackbotsspam
(sshd) Failed SSH login from 106.51.113.15 (IN/India/broadband.actcorp.in): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 11 19:38:36 srv sshd[8206]: Invalid user zhaoxinyue from 106.51.113.15 port 51403
Jul 11 19:38:38 srv sshd[8206]: Failed password for invalid user zhaoxinyue from 106.51.113.15 port 51403 ssh2
Jul 11 19:44:24 srv sshd[8351]: Invalid user janele from 106.51.113.15 port 60459
Jul 11 19:44:26 srv sshd[8351]: Failed password for invalid user janele from 106.51.113.15 port 60459 ssh2
Jul 11 19:47:40 srv sshd[8432]: Invalid user marisha from 106.51.113.15 port 57033
2020-07-12 02:39:10
125.22.9.186 attack
Jul 11 20:10:47 piServer sshd[18951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186 
Jul 11 20:10:50 piServer sshd[18951]: Failed password for invalid user adrianna from 125.22.9.186 port 33193 ssh2
Jul 11 20:14:20 piServer sshd[19328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186 
...
2020-07-12 02:32:35
188.219.251.4 attackbotsspam
Jul 11 19:39:24 hosting sshd[31662]: Invalid user poppy from 188.219.251.4 port 58755
...
2020-07-12 02:23:08
178.128.121.137 attack
Jul 11 18:42:19 rotator sshd\[3835\]: Invalid user yukiko from 178.128.121.137Jul 11 18:42:21 rotator sshd\[3835\]: Failed password for invalid user yukiko from 178.128.121.137 port 56808 ssh2Jul 11 18:49:14 rotator sshd\[4722\]: Invalid user wwilliam from 178.128.121.137Jul 11 18:49:16 rotator sshd\[4722\]: Failed password for invalid user wwilliam from 178.128.121.137 port 54802 ssh2Jul 11 18:52:11 rotator sshd\[5508\]: Invalid user wlm from 178.128.121.137Jul 11 18:52:13 rotator sshd\[5508\]: Failed password for invalid user wlm from 178.128.121.137 port 46086 ssh2
...
2020-07-12 02:25:45
106.52.176.118 attackspam
Jul 11 19:06:15 backup sshd[31983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.176.118 
Jul 11 19:06:17 backup sshd[31983]: Failed password for invalid user yuchen from 106.52.176.118 port 43754 ssh2
...
2020-07-12 02:38:53
173.18.146.42 attackspam
Invalid user admin from 173.18.146.42 port 39181
2020-07-12 02:26:41
159.138.65.35 attack
Invalid user huqm from 159.138.65.35 port 59816
2020-07-12 02:27:54
118.25.159.166 attackspambots
Invalid user oliver from 118.25.159.166 port 33476
2020-07-12 02:35:01

Recently Reported IPs

113.103.14.88 113.103.140.224 113.103.141.179 113.103.141.43
113.103.141.70 113.103.143.10 113.103.143.132 113.103.143.241
113.103.143.253 113.103.143.44 113.103.143.50 113.103.143.73
113.103.143.80 113.103.143.96 113.103.148.193 3.215.80.160
113.103.148.20 113.103.148.69 113.103.149.137 185.164.4.205