Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guangzhou

Region: Guangdong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.99.40.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16231
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.99.40.130.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101702 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 18 03:18:36 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 130.40.99.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.40.99.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.205.124 attack
" "
2020-04-17 01:32:39
180.248.120.217 attackbots
Invalid user admin from 180.248.120.217 port 26865
2020-04-17 01:06:26
222.186.180.130 attackbotsspam
2020-04-16T19:04:43.669212vps773228.ovh.net sshd[2651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-04-16T19:04:46.334716vps773228.ovh.net sshd[2651]: Failed password for root from 222.186.180.130 port 17429 ssh2
2020-04-16T19:04:43.669212vps773228.ovh.net sshd[2651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-04-16T19:04:46.334716vps773228.ovh.net sshd[2651]: Failed password for root from 222.186.180.130 port 17429 ssh2
2020-04-16T19:04:47.997114vps773228.ovh.net sshd[2651]: Failed password for root from 222.186.180.130 port 17429 ssh2
...
2020-04-17 01:07:58
91.229.233.100 attack
Apr 16 14:02:54 server sshd[3967]: Failed password for root from 91.229.233.100 port 37490 ssh2
Apr 16 14:07:09 server sshd[8202]: Failed password for root from 91.229.233.100 port 43002 ssh2
Apr 16 14:11:32 server sshd[11614]: Failed password for invalid user git from 91.229.233.100 port 48546 ssh2
2020-04-17 01:03:07
86.131.19.87 attackspambots
ssh intrusion attempt
2020-04-17 01:40:46
45.134.179.243 attackbots
firewall-block, port(s): 33890/tcp
2020-04-17 01:28:06
122.51.21.208 attackspambots
Apr 16 09:06:38 ws22vmsma01 sshd[46445]: Failed password for root from 122.51.21.208 port 59350 ssh2
...
2020-04-17 01:15:42
159.203.115.191 attackspambots
Apr 16 10:00:03 pixelmemory sshd[6117]: Failed password for root from 159.203.115.191 port 55401 ssh2
Apr 16 10:10:44 pixelmemory sshd[11240]: Failed password for root from 159.203.115.191 port 59616 ssh2
...
2020-04-17 01:17:57
220.167.224.133 attackspam
Port Scan: Events[2] countPorts[1]: 445 ..
2020-04-17 01:25:27
161.35.108.8 attackspambots
nft/Honeypot
2020-04-17 01:29:05
157.119.250.11 attackspam
Apr 16 14:11:27 debian-2gb-nbg1-2 kernel: \[9298068.356024\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=157.119.250.11 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=54321 PROTO=TCP SPT=38385 DPT=5995 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-17 01:08:18
88.214.26.18 attackspambots
Unauthorized connection attempt detected from IP address 88.214.26.18 to port 3308
2020-04-17 01:06:00
128.199.218.137 attackspambots
Apr 16 18:41:25 srv01 sshd[17746]: Invalid user ftpadmin from 128.199.218.137 port 53400
Apr 16 18:41:25 srv01 sshd[17746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.218.137
Apr 16 18:41:25 srv01 sshd[17746]: Invalid user ftpadmin from 128.199.218.137 port 53400
Apr 16 18:41:27 srv01 sshd[17746]: Failed password for invalid user ftpadmin from 128.199.218.137 port 53400 ssh2
Apr 16 18:45:53 srv01 sshd[18068]: Invalid user lb from 128.199.218.137 port 60536
...
2020-04-17 01:22:40
37.228.132.126 attackspam
Invalid user ismail from 37.228.132.126 port 49252
2020-04-17 01:29:59
178.62.214.85 attackspam
Apr 16 14:46:13 ns381471 sshd[12909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
Apr 16 14:46:15 ns381471 sshd[12909]: Failed password for invalid user pg from 178.62.214.85 port 34919 ssh2
2020-04-17 01:26:30

Recently Reported IPs

149.112.32.208 103.242.66.110 96.93.63.172 219.52.204.199
102.2.28.152 20.249.195.90 101.19.171.45 133.235.36.246
25.228.195.165 11.212.1.170 79.253.119.172 4.247.5.100
255.242.23.17 91.144.143.206 134.151.11.12 123.27.143.137
197.102.117.174 19.72.168.165 218.186.208.172 202.173.1.64