Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.34.211.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37450
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.34.211.141.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 11 00:25:42 CST 2019
;; MSG SIZE  rcvd: 118
Host info
141.211.34.113.in-addr.arpa domain name pointer 113x34x211x141.ap113.ftth.ucom.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
141.211.34.113.in-addr.arpa	name = 113x34x211x141.ap113.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.75.105.214 attackbotsspam
Unauthorized connection attempt detected from IP address 223.75.105.214 to port 23
2020-05-31 04:35:17
188.170.80.177 attackbots
Unauthorized connection attempt from IP address 188.170.80.177 on Port 445(SMB)
2020-05-31 04:47:37
14.152.106.39 attackspam
Unauthorized connection attempt detected from IP address 14.152.106.39 to port 5901
2020-05-31 04:33:53
85.106.99.73 attack
Unauthorized connection attempt from IP address 85.106.99.73 on Port 445(SMB)
2020-05-31 04:38:23
34.89.229.222 attackbotsspam
SSH_scan
2020-05-31 04:56:27
37.57.161.50 attack
Unauthorized connection attempt detected from IP address 37.57.161.50 to port 445
2020-05-31 04:32:34
37.46.240.200 attackspam
Unauthorized connection attempt detected from IP address 37.46.240.200 to port 445
2020-05-31 04:32:55
1.193.56.157 attackbotsspam
Unauthorized connection attempt detected from IP address 1.193.56.157 to port 445
2020-05-31 04:34:45
180.76.171.57 attack
Bruteforce detected by fail2ban
2020-05-31 04:37:58
91.107.87.127 attackbotsspam
May 30 22:31:47 * sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.107.87.127
May 30 22:31:49 * sshd[32356]: Failed password for invalid user nazih from 91.107.87.127 port 53184 ssh2
2020-05-31 04:55:37
41.90.20.186 attack
Unauthorized connection attempt detected from IP address 41.90.20.186 to port 1433
2020-05-31 04:30:51
60.162.248.96 attack
Unauthorized connection attempt detected from IP address 60.162.248.96 to port 23
2020-05-31 04:27:37
203.143.12.26 attackspam
May 31 03:32:09 itv-usvr-01 sshd[23763]: Invalid user etienne from 203.143.12.26
May 31 03:32:09 itv-usvr-01 sshd[23763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.12.26
May 31 03:32:09 itv-usvr-01 sshd[23763]: Invalid user etienne from 203.143.12.26
May 31 03:32:11 itv-usvr-01 sshd[23763]: Failed password for invalid user etienne from 203.143.12.26 port 47991 ssh2
2020-05-31 04:44:11
51.75.66.142 attackspam
May 30 22:42:42 piServer sshd[12597]: Failed password for root from 51.75.66.142 port 44222 ssh2
May 30 22:46:12 piServer sshd[12936]: Failed password for root from 51.75.66.142 port 50200 ssh2
...
2020-05-31 04:56:43
62.68.146.229 attackspam
Unauthorized connection attempt detected from IP address 62.68.146.229 to port 139
2020-05-31 04:27:05

Recently Reported IPs

1.130.150.8 148.211.236.177 187.242.131.182 184.0.165.7
71.176.231.137 37.194.16.255 144.80.64.44 189.229.80.35
68.97.134.232 23.224.221.105 100.57.8.14 157.18.183.45
96.246.131.235 117.5.199.148 71.35.38.240 104.151.133.30
108.208.167.104 117.178.236.28 2.126.14.205 99.184.70.232