Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.131.22.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.131.22.145.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 04:29:04 CST 2019
;; MSG SIZE  rcvd: 118
Host info
145.22.131.117.in-addr.arpa domain name pointer .
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.22.131.117.in-addr.arpa	name = .

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.28.223.130 attackspambots
Jan  1 07:19:55 h2421860 postfix/postscreen[27911]: CONNECT from [139.28.223.130]:54755 to [85.214.119.52]:25
Jan  1 07:19:55 h2421860 postfix/dnsblog[27913]: addr 139.28.223.130 listed by domain b.barracudacentral.org as 127.0.0.2
Jan  1 07:19:55 h2421860 postfix/dnsblog[27915]: addr 139.28.223.130 listed by domain Unknown.trblspam.com as 185.53.179.7
Jan  1 07:20:01 h2421860 postfix/postscreen[27911]: DNSBL rank 3 for [139.28.223.130]:54755
Jan x@x
Jan  1 07:20:01 h2421860 postfix/postscreen[27911]: DISCONNECT [139.28.223.130]:54755


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=139.28.223.130
2020-01-01 17:00:15
185.193.86.195 attack
Chat Spam
2020-01-01 17:25:09
18.221.206.247 attack
Automatic report - Web App Attack
2020-01-01 17:08:53
27.78.14.83 attackbots
SSH-bruteforce attempts
2020-01-01 17:05:34
60.208.162.180 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-01 17:37:06
59.88.127.45 attackspambots
1577859960 - 01/01/2020 07:26:00 Host: 59.88.127.45/59.88.127.45 Port: 445 TCP Blocked
2020-01-01 16:58:49
24.200.131.245 attackspam
Jan  1 09:21:33 servernet sshd[2128]: Invalid user tez from 24.200.131.245
Jan  1 09:21:35 servernet sshd[2128]: Failed password for invalid user tez from 24.200.131.245 port 45312 ssh2
Jan  1 09:44:42 servernet sshd[2289]: Invalid user nakahara from 24.200.131.245
Jan  1 09:44:44 servernet sshd[2289]: Failed password for invalid user nakahara from 24.200.131.245 port 49406 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=24.200.131.245
2020-01-01 17:33:36
212.169.239.61 attackbotsspam
Automatic report - Banned IP Access
2020-01-01 17:21:15
51.68.198.113 attackspam
Jan  1 08:37:47 sd-53420 sshd\[12794\]: User root from 51.68.198.113 not allowed because none of user's groups are listed in AllowGroups
Jan  1 08:37:47 sd-53420 sshd\[12794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113  user=root
Jan  1 08:37:49 sd-53420 sshd\[12794\]: Failed password for invalid user root from 51.68.198.113 port 58624 ssh2
Jan  1 08:40:18 sd-53420 sshd\[13659\]: Invalid user stahlnecker from 51.68.198.113
Jan  1 08:40:18 sd-53420 sshd\[13659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113
...
2020-01-01 17:24:01
132.148.241.6 attackspam
01.01.2020 07:26:08 - Wordpress fail 
Detected by ELinOX-ALM
2020-01-01 16:57:43
180.76.150.241 attackbots
Jan  1 04:19:28 plusreed sshd[7369]: Invalid user nobody4 from 180.76.150.241
Jan  1 04:19:28 plusreed sshd[7369]: Invalid user nobody4 from 180.76.150.241
Jan  1 04:19:28 plusreed sshd[7369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.150.241
Jan  1 04:19:28 plusreed sshd[7369]: Invalid user nobody4 from 180.76.150.241
Jan  1 04:19:30 plusreed sshd[7369]: Failed password for invalid user nobody4 from 180.76.150.241 port 44082 ssh2
...
2020-01-01 17:23:06
216.218.206.107 attackspambots
01/01/2020-03:19:24.866545 216.218.206.107 Protocol: 17 GPL RPC portmap listing UDP 111
2020-01-01 17:16:14
78.139.216.116 attackbots
Lines containing failures of 78.139.216.116
Dec 31 12:43:11 siirappi sshd[24268]: Invalid user wwwadmin from 78.139.216.116 port 47398
Dec 31 12:43:11 siirappi sshd[24268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.116
Dec 31 12:43:14 siirappi sshd[24268]: Failed password for invalid user wwwadmin from 78.139.216.116 port 47398 ssh2
Dec 31 12:43:14 siirappi sshd[24268]: Received disconnect from 78.139.216.116 port 47398:11: Bye Bye [preauth]
Dec 31 12:43:14 siirappi sshd[24268]: Disconnected from 78.139.216.116 port 47398 [preauth]
Dec 31 13:02:59 siirappi sshd[24556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.116  user=smmsp
Dec 31 13:03:01 siirappi sshd[24556]: Failed password for smmsp from 78.139.216.116 port 51676 ssh2
Dec 31 13:03:01 siirappi sshd[24556]: Received disconnect from 78.139.216.116 port 51676:11: Bye Bye [preauth]
Dec 31 13:03:01 siirappi s........
------------------------------
2020-01-01 17:26:06
37.187.116.98 attackspam
Host Scan
2020-01-01 16:59:09
159.203.81.28 attackbots
Jan  1 10:47:31 ncomp sshd[29596]: Invalid user malena from 159.203.81.28
Jan  1 10:47:31 ncomp sshd[29596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.81.28
Jan  1 10:47:31 ncomp sshd[29596]: Invalid user malena from 159.203.81.28
Jan  1 10:47:34 ncomp sshd[29596]: Failed password for invalid user malena from 159.203.81.28 port 56335 ssh2
2020-01-01 17:02:07

Recently Reported IPs

191.22.169.181 27.224.137.252 27.186.215.30 41.0.144.197
13.88.220.205 129.149.191.214 101.148.39.167 217.145.130.66
8.17.250.102 44.253.87.253 1.202.114.137 223.166.74.249
93.6.124.115 115.24.218.188 87.19.180.107 221.213.75.204
101.172.197.160 221.204.149.131 108.82.45.77 120.8.115.58