Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.120.140.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.120.140.105.		IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 22:13:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 105.140.120.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.140.120.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.172.180.76 attack
Invalid user vph from 163.172.180.76 port 60034
2020-05-22 06:09:23
27.221.97.3 attackbotsspam
May 22 03:02:52 gw1 sshd[5382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.3
May 22 03:02:53 gw1 sshd[5382]: Failed password for invalid user wvm from 27.221.97.3 port 55296 ssh2
...
2020-05-22 06:19:02
192.144.187.153 attackspambots
Invalid user node from 192.144.187.153 port 36200
2020-05-22 06:12:20
129.213.84.212 attack
May 21 23:04:49 v22019058497090703 sshd[25099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.84.212
May 21 23:04:51 v22019058497090703 sshd[25099]: Failed password for invalid user huawei from 129.213.84.212 port 53769 ssh2
...
2020-05-22 06:41:52
222.186.175.217 attackspam
585. On May 21 2020 experienced a Brute Force SSH login attempt -> 415 unique times by 222.186.175.217.
2020-05-22 06:44:28
122.152.204.42 attack
Invalid user xzr from 122.152.204.42 port 51646
2020-05-22 06:42:10
37.49.226.173 attackbots
Invalid user user from 37.49.226.173 port 34737
2020-05-22 06:18:42
181.133.128.152 attackbots
RDP Brute-Force
2020-05-22 06:45:23
191.252.17.225 attackspambots
From: "Planeta Sinalização"  (Garantia de segurança.)
2020-05-22 06:26:01
106.12.137.46 attack
May 21 23:29:57 santamaria sshd\[21696\]: Invalid user fin from 106.12.137.46
May 21 23:29:57 santamaria sshd\[21696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.46
May 21 23:29:59 santamaria sshd\[21696\]: Failed password for invalid user fin from 106.12.137.46 port 50278 ssh2
...
2020-05-22 06:17:12
54.38.196.4 attackspambots
May 22 00:11:34 vps647732 sshd[12532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.196.4
May 22 00:11:35 vps647732 sshd[12532]: Failed password for invalid user ut99server from 54.38.196.4 port 60066 ssh2
...
2020-05-22 06:17:34
162.14.18.148 attack
SSH Invalid Login
2020-05-22 06:35:37
210.14.77.102 attackbots
May 21 23:05:36 ajax sshd[13317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102 
May 21 23:05:38 ajax sshd[13317]: Failed password for invalid user ozv from 210.14.77.102 port 63720 ssh2
2020-05-22 06:14:42
218.92.0.158 attackbotsspam
541. On May 21 2020 experienced a Brute Force SSH login attempt -> 121 unique times by 218.92.0.158.
2020-05-22 06:12:38
51.77.137.230 attackbots
Invalid user syz from 51.77.137.230 port 45578
2020-05-22 06:37:28

Recently Reported IPs

113.120.140.103 113.120.140.106 113.120.140.109 113.120.140.11
113.120.140.110 113.120.140.116 113.120.140.120 113.120.140.122
113.120.140.125 113.120.140.128 113.120.140.13 113.120.140.131
113.120.140.136 113.120.140.140 147.158.119.128 113.120.140.142
113.120.140.147 107.0.189.224 113.120.140.148 113.120.140.150