Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.140.56.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.140.56.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 676 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:52:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 131.56.140.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 131.56.140.117.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
47.40.20.1 attackspambots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:47:50
45.80.65.8 attackspambots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:52:24
61.219.11.1 attackspam
Brute-Force on ftp at 2020-01-02.
2020-01-03 00:25:20
122.178.15.148 attack
Sniffing for wp-login
2020-01-03 00:41:23
67.55.92.8 attackbotsspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:18:38
80.93.214.15 attackbotsspam
Jan  2 16:57:52 MK-Soft-VM7 sshd[12208]: Failed password for root from 80.93.214.15 port 47380 ssh2
...
2020-01-03 00:41:51
5.0.3.139 attack
Jan  2 15:56:33 [munged] sshd[15710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.0.3.139
2020-01-03 00:51:51
177.69.190.97 attackspambots
Automatically reported by fail2ban report script (netz-treff)
2020-01-03 00:15:29
65.155.30.1 attack
web Attack on Website at 2020-01-02.
2020-01-03 00:20:32
47.205.52.1 attack
web Attack on Website at 2020-01-02.
2020-01-03 00:49:02
49.88.112.6 attack
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:46:03
47.244.164.9 attackbots
web Attack on Wordpress site at 2020-01-02.
2020-01-03 00:48:37
5.2.140.9 attackbots
web Attack on Website at 2020-01-02.
2020-01-03 00:43:35
112.85.42.180 attack
2020-01-02T17:00:09.906353struts4.enskede.local sshd\[26172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2020-01-02T17:00:12.763769struts4.enskede.local sshd\[26172\]: Failed password for root from 112.85.42.180 port 4187 ssh2
2020-01-02T17:00:17.463064struts4.enskede.local sshd\[26172\]: Failed password for root from 112.85.42.180 port 4187 ssh2
2020-01-02T17:00:22.486507struts4.enskede.local sshd\[26172\]: Failed password for root from 112.85.42.180 port 4187 ssh2
2020-01-02T17:00:26.538627struts4.enskede.local sshd\[26172\]: Failed password for root from 112.85.42.180 port 4187 ssh2
...
2020-01-03 00:37:16
54.39.16.2 attackspambots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:28:52

Recently Reported IPs

161.105.78.15 93.207.204.183 194.141.112.21 206.129.97.18
67.158.254.135 168.26.191.43 185.78.116.23 35.155.14.174
155.209.192.126 129.125.200.250 125.242.207.248 54.10.129.127
216.8.222.206 226.149.189.196 192.229.180.159 106.237.23.162
245.19.8.23 118.105.131.59 224.249.68.97 44.35.217.125