Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.136.20.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.136.20.50.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:37:35 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 50.20.136.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.20.136.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.68.208.120 attack
SSH Brute-Force attacks
2019-11-10 05:03:52
111.231.89.197 attack
Nov  9 17:15:32 [munged] sshd[17695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.197
2019-11-10 04:45:40
114.175.222.92 attackspam
Unauthorized connection attempt from IP address 114.175.222.92 on Port 445(SMB)
2019-11-10 05:04:13
180.242.223.195 attack
Unauthorized connection attempt from IP address 180.242.223.195 on Port 445(SMB)
2019-11-10 05:00:12
120.194.42.194 attackbots
Port scan: Attack repeated for 24 hours
2019-11-10 05:11:26
192.99.128.239 attack
Nov  9 16:42:51 venus sshd\[8472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.128.239  user=root
Nov  9 16:42:53 venus sshd\[8472\]: Failed password for root from 192.99.128.239 port 46366 ssh2
Nov  9 16:46:57 venus sshd\[8517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.128.239  user=root
...
2019-11-10 05:08:28
61.222.56.80 attackspambots
Nov  9 20:28:18 MK-Soft-Root2 sshd[19437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80 
Nov  9 20:28:20 MK-Soft-Root2 sshd[19437]: Failed password for invalid user 1234@1234a from 61.222.56.80 port 49654 ssh2
...
2019-11-10 05:09:38
200.150.177.9 attackbots
$f2bV_matches
2019-11-10 04:54:55
46.170.92.188 attackspam
Unauthorized connection attempt from IP address 46.170.92.188 on Port 445(SMB)
2019-11-10 04:54:39
177.106.5.138 attackspam
Unauthorized connection attempt from IP address 177.106.5.138 on Port 445(SMB)
2019-11-10 04:44:46
54.204.41.233 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-10 05:14:03
116.0.49.252 attack
Unauthorized connection attempt from IP address 116.0.49.252 on Port 445(SMB)
2019-11-10 04:51:59
46.38.144.179 attack
Nov  9 22:05:30 webserver postfix/smtpd\[12442\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 22:06:40 webserver postfix/smtpd\[12442\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 22:07:50 webserver postfix/smtpd\[12769\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 22:08:59 webserver postfix/smtpd\[11480\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 22:10:09 webserver postfix/smtpd\[12442\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-10 05:12:43
159.89.166.78 attack
wp bruteforce
2019-11-10 05:12:58
51.77.245.181 attackspam
Nov  9 21:41:03 vmanager6029 sshd\[5931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.181  user=root
Nov  9 21:41:06 vmanager6029 sshd\[5931\]: Failed password for root from 51.77.245.181 port 42174 ssh2
Nov  9 21:44:17 vmanager6029 sshd\[6056\]: Invalid user michel from 51.77.245.181 port 51630
Nov  9 21:44:17 vmanager6029 sshd\[6056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.181
2019-11-10 05:09:59

Recently Reported IPs

113.136.217.241 113.136.77.50 113.134.139.122 113.136.84.248
113.137.101.150 113.136.180.31 113.136.75.122 113.135.170.27
113.136.121.158 113.136.68.227 113.136.218.155 113.136.202.5
113.136.105.231 113.134.229.97 113.134.220.217 113.136.167.142
113.136.145.94 113.136.65.226 113.136.31.147 113.136.19.15