Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ginowan

Region: Okinawa

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.145.138.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.145.138.131.		IN	A

;; AUTHORITY SECTION:
.			16	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:51:15 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 131.138.145.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.138.145.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.74.182.171 attackbotsspam
failed_logins
2019-07-01 01:48:47
37.9.87.149 attack
Yandexbot, Russian IP, IP: 100.43.85.105 Hostname: 100-43-85-105.spider.yandex.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)
2019-07-01 02:24:38
180.121.131.120 attackspambots
SASL broute force
2019-07-01 02:04:29
106.13.80.143 attackspam
Jun 30 18:20:53 localhost sshd\[33742\]: Invalid user applmgr from 106.13.80.143 port 38676
Jun 30 18:20:53 localhost sshd\[33742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.80.143
...
2019-07-01 01:56:05
43.251.172.166 attackbotsspam
Web-based SQL injection attempt
2019-07-01 01:34:49
174.221.10.33 attackbots
Chat Spam
2019-07-01 02:24:18
82.221.105.6 attack
" "
2019-07-01 01:44:09
211.210.13.201 attackbots
Jun 30 16:47:31 MK-Soft-VM4 sshd\[918\]: Invalid user ftp from 211.210.13.201 port 38234
Jun 30 16:47:31 MK-Soft-VM4 sshd\[918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.13.201
Jun 30 16:47:34 MK-Soft-VM4 sshd\[918\]: Failed password for invalid user ftp from 211.210.13.201 port 38234 ssh2
...
2019-07-01 01:55:41
132.232.90.20 attackspambots
$f2bV_matches
2019-07-01 02:11:03
112.170.78.118 attackspambots
$f2bV_matches
2019-07-01 01:43:45
74.208.124.98 attackspam
Repeated brute force against a port
2019-07-01 02:23:03
175.22.174.124 attackspam
Telnet Server BruteForce Attack
2019-07-01 01:46:12
80.82.70.118 attack
30.06.2019 16:58:53 Connection to port 2087 blocked by firewall
2019-07-01 01:52:09
162.243.158.198 attackbotsspam
Jun 30 15:42:15 mail sshd\[22611\]: Invalid user nginx from 162.243.158.198 port 59380
Jun 30 15:42:15 mail sshd\[22611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.158.198
Jun 30 15:42:17 mail sshd\[22611\]: Failed password for invalid user nginx from 162.243.158.198 port 59380 ssh2
Jun 30 15:44:30 mail sshd\[22784\]: Invalid user quan from 162.243.158.198 port 47892
Jun 30 15:44:30 mail sshd\[22784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.158.198
2019-07-01 01:37:24
167.250.218.99 attackspambots
Brute force attack to crack SMTP password (port 25 / 587)
2019-07-01 02:13:25

Recently Reported IPs

113.149.156.39 113.148.100.213 113.146.139.218 113.149.40.109
113.149.177.173 113.148.55.186 113.149.26.36 113.146.200.222
113.148.161.132 113.146.173.133 113.146.107.119 113.144.64.145
113.148.100.95 113.149.122.157 113.144.201.23 113.15.106.203
113.148.101.10 113.15.169.235 113.146.140.182 113.144.240.32