Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ho Chi Minh City

Region: Ho Chi Minh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
113.22.199.53 attackbots
Unauthorized connection attempt from IP address 113.22.199.53 on Port 445(SMB)
2020-03-28 00:51:54
113.22.199.0 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 15:53:06
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.22.199.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.22.199.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025041003 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 11 07:04:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.199.22.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.199.22.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.228.100.29 attackbotsspam
Oct 16 07:22:34 123flo sshd[19615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.228.100.29  user=root
Oct 16 07:22:36 123flo sshd[19615]: Failed password for root from 192.228.100.29 port 49202 ssh2
Oct 16 07:22:38 123flo sshd[19622]: Invalid user DUP from 192.228.100.29
Oct 16 07:22:38 123flo sshd[19622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.228.100.29 
Oct 16 07:22:38 123flo sshd[19622]: Invalid user DUP from 192.228.100.29
Oct 16 07:22:40 123flo sshd[19622]: Failed password for invalid user DUP from 192.228.100.29 port 49706 ssh2
2019-10-16 21:30:38
171.8.221.58 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 21:00:15
112.114.105.239 attackbots
4 probes eg: /plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=%27%20or%20mid=@%27%20/*!50000union*//*!50000select*/1,2,3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%23@__admin%20limit+0,1),5,6,7,8,9%23@%27+&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294
2019-10-16 21:23:47
77.234.255.9 attack
$f2bV_matches
2019-10-16 21:35:54
104.236.72.187 attack
Oct 16 13:23:03 dedicated sshd[3002]: Invalid user 123456 from 104.236.72.187 port 35921
2019-10-16 21:16:14
221.13.51.91 attackspam
Oct 16 02:14:35 hanapaa sshd\[15760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.13.51.91  user=root
Oct 16 02:14:36 hanapaa sshd\[15760\]: Failed password for root from 221.13.51.91 port 57540 ssh2
Oct 16 02:19:37 hanapaa sshd\[16150\]: Invalid user login from 221.13.51.91
Oct 16 02:19:37 hanapaa sshd\[16150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.13.51.91
Oct 16 02:19:39 hanapaa sshd\[16150\]: Failed password for invalid user login from 221.13.51.91 port 34231 ssh2
2019-10-16 21:29:41
178.128.121.188 attack
$f2bV_matches_ltvn
2019-10-16 21:01:06
222.186.175.161 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Failed password for root from 222.186.175.161 port 50662 ssh2
Failed password for root from 222.186.175.161 port 50662 ssh2
Failed password for root from 222.186.175.161 port 50662 ssh2
Failed password for root from 222.186.175.161 port 50662 ssh2
2019-10-16 20:58:57
203.177.70.171 attackbots
Automatic report - Banned IP Access
2019-10-16 21:32:29
159.203.201.100 attackbotsspam
" "
2019-10-16 21:39:09
206.189.92.150 attackspambots
Oct 16 12:51:40 localhost sshd\[30086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.92.150  user=root
Oct 16 12:51:41 localhost sshd\[30086\]: Failed password for root from 206.189.92.150 port 44654 ssh2
Oct 16 12:56:00 localhost sshd\[30221\]: Invalid user xw from 206.189.92.150 port 55330
Oct 16 12:56:00 localhost sshd\[30221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.92.150
Oct 16 12:56:02 localhost sshd\[30221\]: Failed password for invalid user xw from 206.189.92.150 port 55330 ssh2
...
2019-10-16 21:06:50
139.59.4.224 attackbotsspam
Oct 16 13:16:15 hcbbdb sshd\[2586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.224  user=root
Oct 16 13:16:17 hcbbdb sshd\[2586\]: Failed password for root from 139.59.4.224 port 54822 ssh2
Oct 16 13:20:58 hcbbdb sshd\[3079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.4.224  user=root
Oct 16 13:21:01 hcbbdb sshd\[3079\]: Failed password for root from 139.59.4.224 port 37518 ssh2
Oct 16 13:25:40 hcbbdb sshd\[3582\]: Invalid user test from 139.59.4.224
2019-10-16 21:29:14
198.15.130.18 attackspambots
Oct 16 14:22:36 server sshd\[15533\]: Failed password for invalid user ir from 198.15.130.18 port 48802 ssh2
Oct 16 15:25:57 server sshd\[2475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.15.130.18  user=root
Oct 16 15:25:58 server sshd\[2475\]: Failed password for root from 198.15.130.18 port 39970 ssh2
Oct 16 15:30:35 server sshd\[3968\]: Invalid user clark from 198.15.130.18
Oct 16 15:30:35 server sshd\[3968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.15.130.18 
...
2019-10-16 21:38:09
89.248.168.170 attack
19/10/16@08:16:09: FAIL: Alarm-Intrusion address from=89.248.168.170
...
2019-10-16 21:19:55
5.196.70.107 attack
$f2bV_matches
2019-10-16 21:37:51

Recently Reported IPs

38.191.48.154 158.116.198.252 169.161.151.228 45.156.128.126
247.219.17.161 211.75.132.203 205.169.39.247 45.156.129.130
205.210.31.95 65.208.185.179 101.212.171.8 183.63.153.6
218.108.191.224 44.206.0.15 91.186.210.150 77.237.232.168
20.221.66.174 18.17.7.106 59.82.21.247 59.82.21.215