Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ginowan

Region: Okinawa

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.145.194.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.145.194.107.		IN	A

;; AUTHORITY SECTION:
.			26	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:50:27 CST 2024
;; MSG SIZE  rcvd: 108
Host info
107.194.145.113.in-addr.arpa domain name pointer KD113145194107.ppp-oct.au-hikari.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
107.194.145.113.in-addr.arpa	name = KD113145194107.ppp-oct.au-hikari.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.246.117.148 attack
DATE:2020-05-07 19:22:08, IP:170.246.117.148, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2020-05-08 02:24:20
106.12.58.4 attack
SSH invalid-user multiple login attempts
2020-05-08 02:04:41
83.97.20.31 attackspambots
honeypot 22 port
2020-05-08 02:40:00
51.158.25.202 attack
spam
2020-05-08 02:09:14
222.186.180.6 attackbotsspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-08 02:03:01
182.75.139.26 attack
May  7 19:52:48 PorscheCustomer sshd[16775]: Failed password for root from 182.75.139.26 port 21950 ssh2
May  7 19:57:13 PorscheCustomer sshd[16898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.139.26
May  7 19:57:15 PorscheCustomer sshd[16898]: Failed password for invalid user jagan from 182.75.139.26 port 49180 ssh2
...
2020-05-08 02:13:47
10.68.170.43 attackbotsspam
May  7 17:32:44 baguette sshd\[31045\]: Invalid user system from 10.68.170.43 port 39490
May  7 17:32:44 baguette sshd\[31045\]: Invalid user system from 10.68.170.43 port 39490
May  7 17:33:29 baguette sshd\[31047\]: Invalid user butter from 10.68.170.43 port 49874
May  7 17:33:29 baguette sshd\[31047\]: Invalid user butter from 10.68.170.43 port 49874
May  7 17:34:16 baguette sshd\[31052\]: Invalid user ansible from 10.68.170.43 port 60220
May  7 17:34:16 baguette sshd\[31052\]: Invalid user ansible from 10.68.170.43 port 60220
...
2020-05-08 02:11:53
78.128.113.100 attackspambots
May  7 19:49:19 web01.agentur-b-2.de postfix/smtps/smtpd[285974]: warning: unknown[78.128.113.100]: SASL PLAIN authentication failed: 
May  7 19:49:20 web01.agentur-b-2.de postfix/smtps/smtpd[285974]: lost connection after AUTH from unknown[78.128.113.100]
May  7 19:49:31 web01.agentur-b-2.de postfix/smtps/smtpd[285974]: lost connection after AUTH from unknown[78.128.113.100]
May  7 19:49:40 web01.agentur-b-2.de postfix/smtps/smtpd[285974]: warning: unknown[78.128.113.100]: SASL PLAIN authentication failed: 
May  7 19:49:40 web01.agentur-b-2.de postfix/smtps/smtpd[285974]: lost connection after AUTH from unknown[78.128.113.100]
2020-05-08 02:11:20
72.210.252.142 attackbots
72.210.252.142
US
mail
dovecot
2020-05-07 08:53:39
2020-05-08 08:53:39
2020-05-08 02:02:17
199.68.122.194 attack
May  7 19:21:59 debian-2gb-nbg1-2 kernel: \[11131003.993520\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=199.68.122.194 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=8806 DF PROTO=TCP SPT=61511 DPT=81 WINDOW=14600 RES=0x00 SYN URGP=0
2020-05-08 02:33:24
118.24.83.41 attackspambots
May  7 20:16:16 vps647732 sshd[19519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.83.41
May  7 20:16:18 vps647732 sshd[19519]: Failed password for invalid user admin from 118.24.83.41 port 53042 ssh2
...
2020-05-08 02:20:28
91.104.35.11 attackbotsspam
May  7 11:13:53 server1 sshd\[22107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.104.35.11  user=root
May  7 11:13:55 server1 sshd\[22107\]: Failed password for root from 91.104.35.11 port 33412 ssh2
May  7 11:17:52 server1 sshd\[23297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.104.35.11  user=root
May  7 11:17:53 server1 sshd\[23297\]: Failed password for root from 91.104.35.11 port 45698 ssh2
May  7 11:21:58 server1 sshd\[24552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.104.35.11  user=root
...
2020-05-08 02:32:20
101.231.201.50 attack
May  7 19:15:41 inter-technics sshd[18551]: Invalid user dt from 101.231.201.50 port 25308
May  7 19:15:41 inter-technics sshd[18551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.201.50
May  7 19:15:41 inter-technics sshd[18551]: Invalid user dt from 101.231.201.50 port 25308
May  7 19:15:43 inter-technics sshd[18551]: Failed password for invalid user dt from 101.231.201.50 port 25308 ssh2
May  7 19:22:29 inter-technics sshd[21816]: Invalid user armando from 101.231.201.50 port 30743
...
2020-05-08 02:10:55
222.186.175.217 attackbotsspam
v+ssh-bruteforce
2020-05-08 02:27:21
222.186.173.183 attackspam
May  7 15:26:51 vps46666688 sshd[20649]: Failed password for root from 222.186.173.183 port 44736 ssh2
May  7 15:27:05 vps46666688 sshd[20649]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 44736 ssh2 [preauth]
...
2020-05-08 02:28:55

Recently Reported IPs

113.141.89.103 113.145.82.101 113.145.104.38 113.145.233.118
113.144.196.91 113.145.232.172 113.146.19.131 113.146.199.177
113.143.113.214 113.144.247.247 113.145.214.148 113.146.121.211
113.145.132.58 113.144.34.128 113.143.170.97 113.144.190.94
113.142.88.207 113.145.112.96 113.143.28.221 113.143.87.153