Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wuhan

Region: Hubei

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '113.57.200.0 - 113.57.203.255'

% Abuse contact for '113.57.200.0 - 113.57.203.255' is 'zhaoyz3@chinaunicom.cn'

inetnum:        113.57.200.0 - 113.57.203.255
netname:        wuhan-165-zhuanwang
descr:          Hubei Wuhan DIA Dedicated Internet Access
country:        CN
admin-c:        YL2126-AP
tech-c:         YL2126-AP
abuse-c:        AC1718-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CNCGROUP-HB
mnt-irt:        IRT-CU-CN
last-modified:  2023-10-21T03:39:39Z
source:         APNIC

irt:            IRT-CU-CN
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
e-mail:         zhaoyz3@chinaunicom.cn
abuse-mailbox:  zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
auth:           # Filtered
remarks:        zhaoyz3@chinaunicom.cn is invalid
mnt-by:         MAINT-CNCGROUP
last-modified:  2025-09-10T13:07:04Z
source:         APNIC

role:           ABUSE CUCN
country:        ZZ
address:        No.21,Financial Street
address:        Beijing,100033
address:        P.R.China
phone:          +000000000
e-mail:         zhaoyz3@chinaunicom.cn
admin-c:        CH1302-AP
tech-c:         CH1302-AP
nic-hdl:        AC1718-AP
remarks:        Generated from irt object IRT-CU-CN
remarks:        zhaoyz3@chinaunicom.cn is invalid
abuse-mailbox:  zhaoyz3@chinaunicom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-10T13:08:11Z
source:         APNIC

person:         yigui Liu
nic-hdl:        YL2126-AP
e-mail:         abuse.wh@cnc.cn
address:        No.5,Guanshan 3 Road 296,wuhan East Lake high-tech Development Zone of Hubei province 430074,P.R.China
phone:          +8627 59706108
fax-no:         +8627 59708855
country:        CN
mnt-by:         MAINT-CNCGROUP-HB
last-modified:  2008-09-04T07:54:12Z
source:         APNIC

% Information related to '113.56.0.0/15AS4837'

route:          113.56.0.0/15
descr:          CNC Group CHINA169 Hubei Province Network
country:        CN
origin:         AS4837
mnt-by:         MAINT-CNCGROUP-RR
last-modified:  2008-12-10T02:10:33Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.57.200.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.57.200.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092001 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 21 03:00:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 220.200.57.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.200.57.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.237.211.117 attack
Telnet Server BruteForce Attack
2019-11-21 04:54:41
129.213.122.26 attackspambots
Tried sshing with brute force.
2019-11-21 04:32:58
51.91.36.28 attack
Repeated brute force against a port
2019-11-21 04:52:39
61.129.70.133 attackbotsspam
1433/tcp 8080/tcp 445/tcp...
[2019-09-28/11-20]27pkt,3pt.(tcp)
2019-11-21 04:42:37
54.37.67.144 attackbots
$f2bV_matches_ltvn
2019-11-21 04:33:33
193.70.42.228 attackspambots
Website hacking attempt: Improper php file access [php file]
2019-11-21 04:34:02
51.77.148.87 attackbots
SSH Brute Force
2019-11-21 05:07:22
1.172.232.205 attackbotsspam
2323/tcp
[2019-11-20]1pkt
2019-11-21 04:49:54
80.211.244.72 attack
Nov 20 18:41:48 XXXXXX sshd[20160]: Invalid user cdc from 80.211.244.72 port 42058
2019-11-21 04:42:16
185.173.35.53 attackbotsspam
185.173.35.53 was recorded 5 times by 5 hosts attempting to connect to the following ports: 443,5800,8531,1521,5905. Incident counter (4h, 24h, all-time): 5, 15, 118
2019-11-21 04:46:53
103.103.161.159 attackbotsspam
23/tcp 9000/tcp 23/tcp
[2019-11-18/20]3pkt
2019-11-21 04:41:48
85.100.124.205 attackbots
8080/tcp...
[2019-10-01/11-20]4pkt,2pt.(tcp)
2019-11-21 04:35:07
43.249.194.245 attackspam
Invalid user dz from 43.249.194.245 port 36964
2019-11-21 04:57:59
142.93.238.162 attackspambots
Nov 20 20:10:15 gw1 sshd[11601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
Nov 20 20:10:17 gw1 sshd[11601]: Failed password for invalid user bella from 142.93.238.162 port 38570 ssh2
...
2019-11-21 04:57:14
176.122.1.189 attackspam
1433/tcp
[2019-11-20]1pkt
2019-11-21 04:59:58

Recently Reported IPs

101.26.28.57 109.105.210.60 240d:1c:30:4100:6439:c34a:5435:3e86 220.198.206.206
167.203.250.9 163.227.230.253 128.199.44.215 52.90.230.166
125.75.66.97 31.222.10.110 199.21.149.66 147.185.133.211
104.255.152.29 190.3.170.34 115.194.142.254 35.203.211.75
45.144.212.235 113.183.100.189 196.251.83.129 164.92.141.124