Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.136.167.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.136.167.142.		IN	A

;; AUTHORITY SECTION:
.			12	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:37:48 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 142.167.136.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.167.136.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.200.15 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-10-09 01:44:15
197.39.53.66 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-09 01:46:05
167.248.133.19 attackspam
 UDP 167.248.133.19:33490 -> port 161, len 71
2020-10-09 02:12:10
137.215.41.230 attack
20/10/8@10:58:04: FAIL: Alarm-Network address from=137.215.41.230
20/10/8@10:58:04: FAIL: Alarm-Network address from=137.215.41.230
...
2020-10-09 02:02:09
167.114.3.158 attack
Brute%20Force%20SSH
2020-10-09 01:42:47
162.142.125.22 attack
 TCP (SYN) 162.142.125.22:22445 -> port 445, len 44
2020-10-09 02:07:56
222.239.124.19 attackbots
2 SSH login attempts.
2020-10-09 01:34:02
75.103.66.9 attackspam
Automatic report - Banned IP Access
2020-10-09 01:43:45
109.175.102.213 attack
109.175.102.213 - - [07/Oct/2020:22:40:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1031 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
109.175.102.213 - - [07/Oct/2020:22:42:24 +0200] "POST /xmlrpc.php HTTP/1.1" 403 1031 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-10-09 01:45:45
106.252.164.246 attack
Oct  8 13:52:55 vpn01 sshd[11645]: Failed password for root from 106.252.164.246 port 41958 ssh2
...
2020-10-09 01:58:54
183.81.78.110 attack
SORBS spam violations   / proto=6  .  srcport=49365  .  dstport=23 Telnet  .     (255)
2020-10-09 01:48:29
199.195.252.209 attackspambots
*Port Scan* detected from 199.195.252.209 (US/United States/-). 11 hits in the last 110 seconds; Ports: *; Direction: in; Trigger: PS_LIMIT
2020-10-09 02:05:01
218.87.107.134 attack
1433/tcp 445/tcp...
[2020-08-15/10-08]6pkt,2pt.(tcp)
2020-10-09 01:50:50
185.220.102.243 attack
fell into ViewStateTrap:wien2018
2020-10-09 01:42:21
46.101.7.170 attackbots
Unauthorized connection attempt detected from IP address 46.101.7.170 to port 28082
2020-10-09 02:09:58

Recently Reported IPs

113.134.220.217 113.136.145.94 113.136.65.226 113.136.31.147
113.136.19.15 113.134.64.92 113.134.252.91 113.134.162.212
113.134.16.51 113.136.141.127 113.135.180.42 113.136.254.208
113.136.193.134 113.135.199.53 113.135.66.136 113.135.69.170
113.135.240.135 113.136.169.43 113.136.80.136 113.135.190.147