Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
113.116.145.169 attackbots
Brute force blocker - service: proftpd1, proftpd2 - aantal: 100 - Fri May  4 09:45:19 2018
2020-02-25 06:57:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.116.145.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.116.145.107.		IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 20:22:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 107.145.116.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.145.116.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.118.18.189 attackbots
1588364031 - 05/01/2020 22:13:51 Host: 212.118.18.189/212.118.18.189 Port: 445 TCP Blocked
2020-05-02 06:18:52
89.248.168.218 attackspambots
Fail2Ban Ban Triggered
2020-05-02 06:12:34
46.101.40.21 attack
Invalid user devs from 46.101.40.21 port 59340
2020-05-02 06:39:05
104.245.144.58 attackspambots
(From estelle.reid@gmail.com) Wanna promote your business on thousands of advertising sites monthly? For a small monthly payment you can get almost endless traffic to your site forever!

Check out our site now: http://www.adpostingrobot.xyz
2020-05-02 06:33:21
192.169.200.145 attack
Automatic report - XMLRPC Attack
2020-05-02 06:04:03
221.179.103.2 attack
Invalid user admin from 221.179.103.2 port 40320
2020-05-02 06:08:35
201.148.87.82 attackbots
$f2bV_matches
2020-05-02 06:13:15
49.247.135.122 attackbotsspam
Invalid user kevin from 49.247.135.122 port 52926
2020-05-02 06:35:20
187.141.128.42 attack
Invalid user blue from 187.141.128.42 port 59902
2020-05-02 06:11:47
58.64.166.196 attack
Invalid user osboxes from 58.64.166.196 port 53108
2020-05-02 06:32:19
81.246.218.220 attackspam
SSH Invalid Login
2020-05-02 06:05:55
69.206.228.124 attackbots
Automatic report - Port Scan Attack
2020-05-02 06:14:49
82.214.47.39 attackspam
[Aegis] @ 2020-04-28 07:55:59  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-05-02 06:29:28
62.210.206.78 attackbotsspam
(sshd) Failed SSH login from 62.210.206.78 (FR/France/62-210-206-78.rev.poneytelecom.eu): 5 in the last 3600 secs
2020-05-02 06:23:34
212.64.43.52 attackbots
SSH Invalid Login
2020-05-02 06:03:14

Recently Reported IPs

113.116.145.104 113.116.145.115 113.116.145.120 113.116.145.136
113.116.145.138 113.116.145.143 19.21.43.57 113.116.145.150
113.116.145.16 113.116.145.163 113.116.145.179 113.116.145.180
113.116.145.184 113.116.145.186 113.116.145.189 113.116.145.192
113.116.145.194 113.116.145.200 244.7.153.208 113.116.145.206