Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: ChinaNet Shaanxi Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Invalid user ih from 113.140.10.134 port 52518
2020-04-21 07:14:35
attackbots
DATE:2020-04-18 09:45:08,IP:113.140.10.134,MATCHES:10,PORT:ssh
2020-04-18 18:09:03
attack
Invalid user dead from 113.140.10.134 port 50610
2020-04-18 07:28:27
attackbots
Apr 12 07:38:39 nextcloud sshd\[14869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134  user=root
Apr 12 07:38:40 nextcloud sshd\[14869\]: Failed password for root from 113.140.10.134 port 35692 ssh2
Apr 12 07:41:45 nextcloud sshd\[17622\]: Invalid user deploy from 113.140.10.134
Apr 12 07:41:45 nextcloud sshd\[17622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134
2020-04-12 13:54:30
attack
Apr  5 14:49:39 lanister sshd[10090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134  user=root
Apr  5 14:49:41 lanister sshd[10090]: Failed password for root from 113.140.10.134 port 43452 ssh2
Apr  5 14:54:44 lanister sshd[10159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134  user=root
Apr  5 14:54:45 lanister sshd[10159]: Failed password for root from 113.140.10.134 port 47200 ssh2
2020-04-06 04:21:16
attackbotsspam
Apr  4 15:10:51 master sshd[6156]: Failed password for root from 113.140.10.134 port 60400 ssh2
Apr  4 15:29:55 master sshd[6271]: Failed password for root from 113.140.10.134 port 39154 ssh2
Apr  4 15:35:29 master sshd[6703]: Failed password for invalid user sachin from 113.140.10.134 port 34600 ssh2
Apr  4 15:40:33 master sshd[6788]: Failed password for root from 113.140.10.134 port 58250 ssh2
Apr  4 15:45:47 master sshd[6839]: Failed password for root from 113.140.10.134 port 53666 ssh2
Apr  4 15:56:39 master sshd[6894]: Failed password for root from 113.140.10.134 port 44528 ssh2
Apr  4 16:02:12 master sshd[7322]: Failed password for root from 113.140.10.134 port 39944 ssh2
Apr  4 16:07:42 master sshd[7330]: Failed password for root from 113.140.10.134 port 35356 ssh2
Apr  4 16:13:31 master sshd[7417]: Failed password for root from 113.140.10.134 port 59004 ssh2
Apr  4 16:19:08 master sshd[7470]: Failed password for root from 113.140.10.134 port 54422 ssh2
2020-04-05 02:21:29
Comments on same subnet:
IP Type Details Datetime
113.140.10.30 attackbots
Aug 24 17:50:28 lnxweb62 sshd[30467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.30
2019-08-25 00:14:00
113.140.10.30 attackspam
Reported by AbuseIPDB proxy server.
2019-08-19 04:31:02
113.140.10.30 attackbots
Aug 14 18:39:13 vps647732 sshd[30901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.30
Aug 14 18:39:15 vps647732 sshd[30901]: Failed password for invalid user toby from 113.140.10.30 port 52324 ssh2
...
2019-08-15 06:18:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.140.10.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.140.10.134.			IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040402 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 02:21:25 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 134.10.140.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.10.140.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.205.51.40 attack
Invalid user tempuser from 37.205.51.40 port 37022
2020-10-02 21:49:36
103.111.81.58 attack
Repeated RDP login failures. Last user: Test1
2020-10-02 21:35:37
129.211.185.209 attack
Repeated RDP login failures. Last user: Administrator
2020-10-02 21:34:52
157.230.46.26 attack
1814/tcp 4679/tcp 29982/tcp...
[2020-08-04/10-02]31pkt,13pt.(tcp)
2020-10-02 21:42:56
165.84.180.63 attackspam
Repeated attempts to deliver spam
2020-10-02 21:27:01
49.233.175.232 attackspambots
Repeated RDP login failures. Last user: Administrator
2020-10-02 21:31:48
104.47.57.161 spambotsattackproxynormal
Beröau
2020-10-02 21:46:57
192.241.238.43 attackspam
SSH login attempts.
2020-10-02 21:54:18
193.112.52.18 attackbotsspam
Repeated RDP login failures. Last user: Cathy
2020-10-02 21:26:19
192.241.218.14 attackspambots
TCP port : 5222
2020-10-02 21:52:50
152.136.116.24 attackspambots
Repeated RDP login failures. Last user: Security
2020-10-02 21:27:35
120.53.117.206 attack
Repeated RDP login failures. Last user: Sarah
2020-10-02 21:35:10
184.154.47.5 attack
firewall-block, port(s): 8010/tcp
2020-10-02 21:59:02
81.215.238.221 attack
firewall-block, port(s): 445/tcp
2020-10-02 21:38:08
183.16.209.235 attackbots
Unauthorised access (Oct  2) SRC=183.16.209.235 LEN=40 TTL=49 ID=51594 TCP DPT=8080 WINDOW=47745 SYN 
Unauthorised access (Oct  2) SRC=183.16.209.235 LEN=40 TTL=49 ID=18442 TCP DPT=8080 WINDOW=47745 SYN 
Unauthorised access (Oct  1) SRC=183.16.209.235 LEN=40 TTL=49 ID=43108 TCP DPT=8080 WINDOW=17218 SYN 
Unauthorised access (Sep 30) SRC=183.16.209.235 LEN=40 TTL=49 ID=10823 TCP DPT=8080 WINDOW=17218 SYN 
Unauthorised access (Sep 30) SRC=183.16.209.235 LEN=40 TTL=49 ID=54897 TCP DPT=8080 WINDOW=17218 SYN 
Unauthorised access (Sep 30) SRC=183.16.209.235 LEN=40 TTL=49 ID=35827 TCP DPT=8080 WINDOW=47745 SYN 
Unauthorised access (Sep 29) SRC=183.16.209.235 LEN=40 TTL=49 ID=59887 TCP DPT=8080 WINDOW=47745 SYN
2020-10-02 22:01:51

Recently Reported IPs

43.226.28.126 14.253.149.98 47.183.142.139 95.71.117.34
168.20.15.169 42.185.87.183 233.159.144.42 216.6.85.230
197.37.225.128 142.93.20.40 91.216.42.57 140.144.12.241
153.68.162.231 217.130.49.26 83.67.86.12 210.95.53.55
85.238.171.191 149.205.27.25 140.186.162.247 134.209.253.165