Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.242.228.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.242.228.64.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 18:21:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 64.228.242.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.228.242.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.6.20.56 attackbots
Attempted connection to port 23.
2020-08-19 06:37:23
159.89.181.61 attackspambots
Aug 18 20:41:07 localhost sshd[6837]: Invalid user wuf from 159.89.181.61 port 47608
Aug 18 20:41:07 localhost sshd[6837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.181.61
Aug 18 20:41:07 localhost sshd[6837]: Invalid user wuf from 159.89.181.61 port 47608
Aug 18 20:41:08 localhost sshd[6837]: Failed password for invalid user wuf from 159.89.181.61 port 47608 ssh2
Aug 18 20:50:07 localhost sshd[7795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.181.61  user=root
Aug 18 20:50:09 localhost sshd[7795]: Failed password for root from 159.89.181.61 port 34976 ssh2
...
2020-08-19 07:05:43
122.224.0.74 attack
Icarus honeypot on github
2020-08-19 06:57:20
52.169.157.242 attackspambots
Attempted connection to port 3390.
2020-08-19 06:35:55
103.78.143.118 attackspam
Attempted connection to port 445.
2020-08-19 06:56:06
171.244.38.118 attackbots
Multiport scan 54 ports : 486 489 491 4809 4811 4822 4824 4826 4829 4831 4832 4833 4836 4844 4848 4852 4854 4859 4867 4870 4871 4872 4877 4878 4880 4884 4885 4888 4889 4896 4900 4901 4902 4907 4911 4916 4917 4922 4935 4937 4943 4949 4956 4964 4967 4970 4978 4980 4982 4985 4988 4991 4995 4998
2020-08-19 06:48:20
179.145.63.23 attack
Attempted connection to port 445.
2020-08-19 06:44:16
62.96.54.212 attack
Attempted connection to port 22.
2020-08-19 06:34:01
209.17.96.90 attackbotsspam
Brute force attack stopped by firewall
2020-08-19 07:09:29
101.227.67.35 attack
Attempted connection to port 25.
2020-08-19 06:57:52
181.57.179.198 attackbots
SMB Server BruteForce Attack
2020-08-19 06:56:53
2.139.201.243 attackbotsspam
Unauthorized connection attempt from IP address 2.139.201.243 on Port 445(SMB)
2020-08-19 06:45:55
175.24.95.209 attackbots
Aug 18 23:12:15 rocket sshd[10999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.95.209
Aug 18 23:12:17 rocket sshd[10999]: Failed password for invalid user squid from 175.24.95.209 port 59052 ssh2
...
2020-08-19 06:49:59
176.88.97.157 attackspam
Attempted connection to port 445.
2020-08-19 06:47:13
185.244.172.190 attackbotsspam
Aug 18 22:55:43 rancher-0 sshd[1149389]: Invalid user tomcat from 185.244.172.190 port 60962
Aug 18 22:55:45 rancher-0 sshd[1149389]: Failed password for invalid user tomcat from 185.244.172.190 port 60962 ssh2
...
2020-08-19 06:55:13

Recently Reported IPs

113.242.17.34 113.246.129.31 113.246.182.245 113.246.30.214
113.246.42.15 113.246.48.237 113.247.108.53 113.247.143.187
113.247.41.117 113.247.90.130 113.252.104.25 113.253.126.223
113.255.224.106 113.28.176.47 113.28.24.84 113.28.26.201
113.31.109.225 113.31.26.148 113.32.193.143 113.35.62.215