Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Yunnan

Country: China

Internet Service Provider: ChinaNet Yunnan Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Port Scan
...
2020-07-20 05:11:12
attackbotsspam
Attempted connection to port 1433.
2020-03-28 21:09:04
attack
Unauthorized connection attempt detected from IP address 116.55.243.113 to port 1433
2019-12-31 03:35:21
Comments on same subnet:
IP Type Details Datetime
116.55.243.37 attackspam
Port Scan 1433
2019-11-12 22:17:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.55.243.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.55.243.113.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123001 1800 900 604800 86400

;; Query time: 189 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 03:35:17 CST 2019
;; MSG SIZE  rcvd: 118
Host info
113.243.55.116.in-addr.arpa domain name pointer 113.243.55.116.broad.km.yn.dynamic.163data.com.cn.
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
113.243.55.116.IN-ADDR.ARPA	name = 113.243.55.116.broad.km.yn.dynamic.163data.com.cn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
171.238.70.49 attack
Chat Spam
2019-09-26 03:55:10
86.161.164.240 attackspam
Automatic report - Port Scan Attack
2019-09-26 04:05:27
112.186.77.78 attackbotsspam
Sep 25 15:47:19 [host] sshd[29965]: Invalid user tir from 112.186.77.78
Sep 25 15:47:19 [host] sshd[29965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.77.78
Sep 25 15:47:20 [host] sshd[29965]: Failed password for invalid user tir from 112.186.77.78 port 39816 ssh2
2019-09-26 04:23:17
45.135.39.200 attackspambots
B: Magento admin pass test (wrong country)
2019-09-26 03:54:23
73.171.226.23 attack
Brute force SMTP login attempted.
...
2019-09-26 04:04:14
107.128.103.162 attack
Reported by AbuseIPDB proxy server.
2019-09-26 04:20:59
115.124.29.97 attack
Spam from qdt@tritonchina.com
2019-09-26 04:11:58
163.172.225.71 attackspambots
\[2019-09-25 15:31:57\] NOTICE\[1970\] chan_sip.c: Registration from '\' failed for '163.172.225.71:64783' - Wrong password
\[2019-09-25 15:31:57\] SECURITY\[1978\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-25T15:31:57.297-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="491000",SessionID="0x7f9b34331198",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.225.71/64783",Challenge="7be19632",ReceivedChallenge="7be19632",ReceivedHash="30d2531fd2e5602a5f4f166f1743821a"
\[2019-09-25 15:35:14\] NOTICE\[1970\] chan_sip.c: Registration from '\' failed for '163.172.225.71:51307' - Wrong password
\[2019-09-25 15:35:14\] SECURITY\[1978\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-25T15:35:14.100-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="22222220",SessionID="0x7f9b34331198",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV
2019-09-26 03:46:27
115.124.29.172 attack
Spam from qdt@tritonchina.com
2019-09-26 03:57:07
91.137.16.174 attackspam
20 attempts against mh-misbehave-ban on air.magehost.pro
2019-09-26 04:02:47
77.247.109.28 attackspam
\[2019-09-25 09:40:16\] NOTICE\[1970\] chan_sip.c: Registration from '"9999" \' failed for '77.247.109.28:5142' - Wrong password
\[2019-09-25 09:40:16\] SECURITY\[1978\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-25T09:40:16.985-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9999",SessionID="0x7f9b3403d098",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.28/5142",Challenge="6e387814",ReceivedChallenge="6e387814",ReceivedHash="87d86f148b7d94251d70d9bb43093927"
\[2019-09-25 09:40:17\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T09:40:17.963-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470422",SessionID="0x7f9b3402de58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.28/5142",ACLName="no_extension_match"
\[2019-09-25 09:40:17\] SECURITY\[1978\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-25T
2019-09-26 03:56:11
79.13.241.13 attackspam
Automatic report - Port Scan Attack
2019-09-26 03:45:31
123.4.191.98 attack
Unauthorised access (Sep 25) SRC=123.4.191.98 LEN=40 TTL=49 ID=47863 TCP DPT=8080 WINDOW=12702 SYN 
Unauthorised access (Sep 25) SRC=123.4.191.98 LEN=40 TTL=49 ID=29109 TCP DPT=8080 WINDOW=12702 SYN
2019-09-26 04:03:43
49.69.209.59 attackspambots
$f2bV_matches
2019-09-26 04:04:28
107.148.251.203 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-09-26 03:54:09

Recently Reported IPs

148.204.238.170 177.241.169.107 112.67.253.202 31.136.125.220
98.219.226.30 78.223.186.132 97.200.115.226 149.27.223.245
65.155.241.116 212.181.56.90 183.27.84.62 194.182.231.38
79.254.110.52 110.80.152.232 188.186.228.224 101.81.237.163
202.139.235.81 106.56.247.251 86.171.143.204 121.73.233.123