Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
113.128.104.51 attack
Unauthorized connection attempt detected from IP address 113.128.104.51 to port 8118
2020-06-22 06:15:00
113.128.104.216 attackspam
Unauthorized connection attempt detected from IP address 113.128.104.216 to port 123
2020-06-13 07:52:15
113.128.104.123 attack
Fail2Ban Ban Triggered
2020-04-24 13:01:10
113.128.104.207 attack
113.128.104.207 - - \[27/Feb/2020:16:27:04 +0200\] "CONNECT www.ipip.net:443 HTTP/1.1" 403 202 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3"
2020-02-27 23:33:39
113.128.104.219 attack
Fail2Ban Ban Triggered
2020-02-22 04:16:32
113.128.104.46 attack
Unauthorized connection attempt detected from IP address 113.128.104.46 to port 80
2020-02-16 02:11:34
113.128.104.238 attackspambots
The IP has triggered Cloudflare WAF. CF-Ray: 563f3129cef198e7 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.062334851 Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-02-13 01:46:19
113.128.104.89 attack
Unauthorized connection attempt detected from IP address 113.128.104.89 to port 9999 [T]
2020-01-29 10:05:35
113.128.104.234 attackspam
Unauthorized connection attempt detected from IP address 113.128.104.234 to port 8123 [J]
2020-01-29 08:18:18
113.128.104.131 attackspambots
Unauthorized connection attempt detected from IP address 113.128.104.131 to port 1080 [J]
2020-01-29 02:17:51
113.128.104.158 attackspambots
Unauthorized connection attempt detected from IP address 113.128.104.158 to port 6666 [T]
2020-01-27 16:06:48
113.128.104.22 attackspambots
Unauthorized connection attempt detected from IP address 113.128.104.22 to port 8081 [J]
2020-01-27 00:48:55
113.128.104.228 attackspam
Unauthorized connection attempt detected from IP address 113.128.104.228 to port 8888 [J]
2020-01-22 08:57:44
113.128.104.3 attackbots
Unauthorized connection attempt detected from IP address 113.128.104.3 to port 999 [T]
2020-01-20 18:23:28
113.128.104.121 attackspambots
Unauthorized connection attempt detected from IP address 113.128.104.121 to port 9000 [T]
2020-01-19 16:33:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.128.104.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.128.104.70.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 23:23:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 70.104.128.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.104.128.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.246.153.227 attack
Lines containing failures of 190.246.153.227
Aug 14 17:48:33 newdogma sshd[15398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.153.227  user=r.r
Aug 14 17:48:35 newdogma sshd[15398]: Failed password for r.r from 190.246.153.227 port 33934 ssh2
Aug 14 17:48:36 newdogma sshd[15398]: Received disconnect from 190.246.153.227 port 33934:11: Bye Bye [preauth]
Aug 14 17:48:36 newdogma sshd[15398]: Disconnected from authenticating user r.r 190.246.153.227 port 33934 [preauth]
Aug 14 17:53:31 newdogma sshd[15556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.153.227  user=r.r
Aug 14 17:53:33 newdogma sshd[15556]: Failed password for r.r from 190.246.153.227 port 60392 ssh2
Aug 14 17:53:35 newdogma sshd[15556]: Received disconnect from 190.246.153.227 port 60392:11: Bye Bye [preauth]
Aug 14 17:53:35 newdogma sshd[15556]: Disconnected from authenticating user r.r 190.246.153.227 p........
------------------------------
2020-08-15 20:11:38
222.186.190.14 attackspambots
Aug 15 13:57:03 vps639187 sshd\[13037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14  user=root
Aug 15 13:57:05 vps639187 sshd\[13037\]: Failed password for root from 222.186.190.14 port 16566 ssh2
Aug 15 13:57:07 vps639187 sshd\[13037\]: Failed password for root from 222.186.190.14 port 16566 ssh2
...
2020-08-15 19:59:27
35.194.64.202 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-15 20:06:30
45.145.185.187 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-15 20:09:31
54.37.17.21 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-08-15 20:12:06
106.12.175.38 attackbots
2020-08-15T05:39:50.988767morrigan.ad5gb.com sshd[3821877]: Failed password for root from 106.12.175.38 port 53508 ssh2
2020-08-15T05:39:51.330348morrigan.ad5gb.com sshd[3821877]: Disconnected from authenticating user root 106.12.175.38 port 53508 [preauth]
2020-08-15 20:01:27
62.1.90.42 attackbots
Port Scan detected!
...
2020-08-15 20:25:09
150.129.8.17 attackbots
Automatic report - Banned IP Access
2020-08-15 20:01:59
222.186.173.154 attack
Aug 15 09:27:35 firewall sshd[7279]: Failed password for root from 222.186.173.154 port 25664 ssh2
Aug 15 09:27:38 firewall sshd[7279]: Failed password for root from 222.186.173.154 port 25664 ssh2
Aug 15 09:27:41 firewall sshd[7279]: Failed password for root from 222.186.173.154 port 25664 ssh2
...
2020-08-15 20:31:17
218.92.0.202 attack
Aug 15 14:24:42 santamaria sshd\[22263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Aug 15 14:24:44 santamaria sshd\[22263\]: Failed password for root from 218.92.0.202 port 32298 ssh2
Aug 15 14:25:53 santamaria sshd\[22286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
...
2020-08-15 20:31:37
222.186.31.166 attack
Aug 15 12:25:51 localhost sshd[68156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Aug 15 12:25:53 localhost sshd[68156]: Failed password for root from 222.186.31.166 port 59466 ssh2
Aug 15 12:25:55 localhost sshd[68156]: Failed password for root from 222.186.31.166 port 59466 ssh2
Aug 15 12:25:51 localhost sshd[68156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Aug 15 12:25:53 localhost sshd[68156]: Failed password for root from 222.186.31.166 port 59466 ssh2
Aug 15 12:25:55 localhost sshd[68156]: Failed password for root from 222.186.31.166 port 59466 ssh2
Aug 15 12:25:51 localhost sshd[68156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Aug 15 12:25:53 localhost sshd[68156]: Failed password for root from 222.186.31.166 port 59466 ssh2
Aug 15 12:25:55 localhost sshd[68156]: Fa
...
2020-08-15 20:28:30
222.186.30.218 attackbots
Aug 15 12:25:41 game-panel sshd[2634]: Failed password for root from 222.186.30.218 port 10684 ssh2
Aug 15 12:25:44 game-panel sshd[2634]: Failed password for root from 222.186.30.218 port 10684 ssh2
Aug 15 12:25:46 game-panel sshd[2634]: Failed password for root from 222.186.30.218 port 10684 ssh2
2020-08-15 20:39:30
115.159.91.202 attackbotsspam
Aug 15 05:39:52 serwer sshd\[9715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.91.202  user=root
Aug 15 05:39:54 serwer sshd\[9715\]: Failed password for root from 115.159.91.202 port 51292 ssh2
Aug 15 05:44:19 serwer sshd\[13091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.91.202  user=root
...
2020-08-15 20:25:49
190.110.35.130 attackbotsspam
Attempted Brute Force (dovecot)
2020-08-15 20:08:51
222.186.42.213 attack
2020-08-15T12:33:41.607071shield sshd\[19097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-08-15T12:33:43.489508shield sshd\[19097\]: Failed password for root from 222.186.42.213 port 18831 ssh2
2020-08-15T12:33:48.048077shield sshd\[19097\]: Failed password for root from 222.186.42.213 port 18831 ssh2
2020-08-15T12:33:50.495113shield sshd\[19097\]: Failed password for root from 222.186.42.213 port 18831 ssh2
2020-08-15T12:33:53.058599shield sshd\[19111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-08-15 20:36:09

Recently Reported IPs

113.128.104.67 113.128.105.202 113.86.205.69 113.128.105.30
113.128.105.84 113.128.11.106 113.128.120.248 113.128.120.53
113.128.120.56 113.128.120.64 113.128.120.72 113.128.120.76
113.128.120.78 113.128.120.8 113.128.120.84 113.128.120.86
113.128.120.89 113.128.120.96 113.128.121.10 113.128.121.105