Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.113.104.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.113.104.55.			IN	A

;; AUTHORITY SECTION:
.			121	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:33:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 55.104.113.120.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 120.113.104.55.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
23.236.77.27 attackspam
fail2ban - Attack against Apache (too many 404s)
2020-03-21 01:24:46
39.155.215.142 attackspambots
[munged]::443 39.155.215.142 - - [20/Mar/2020:14:09:41 +0100] "POST /[munged]: HTTP/1.1" 200 16858 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 39.155.215.142 - - [20/Mar/2020:14:09:43 +0100] "POST /[munged]: HTTP/1.1" 200 12239 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 39.155.215.142 - - [20/Mar/2020:14:09:43 +0100] "POST /[munged]: HTTP/1.1" 200 12239 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 39.155.215.142 - - [20/Mar/2020:14:09:46 +0100] "POST /[munged]: HTTP/1.1" 200 12239 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 39.155.215.142 - - [20/Mar/2020:14:09:46 +0100] "POST /[munged]: HTTP/1.1" 200 12239 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 39.155.215.142 - - [20/Mar/202
2020-03-21 02:17:07
186.193.141.161 attackbotsspam
" "
2020-03-21 01:39:16
222.186.175.216 attackbotsspam
k+ssh-bruteforce
2020-03-21 02:03:45
185.176.27.122 attack
firewall-block, port(s): 3353/tcp, 3359/tcp, 3398/tcp
2020-03-21 01:50:51
124.95.29.213 attackbots
Unauthorised access (Mar 20) SRC=124.95.29.213 LEN=40 TTL=49 ID=41350 TCP DPT=8080 WINDOW=53574 SYN
2020-03-21 01:57:11
196.52.43.92 attack
ICMP MH Probe, Scan /Distributed -
2020-03-21 01:57:30
82.103.130.25 attackspam
bruteforce detected
2020-03-21 02:24:19
50.127.71.5 attackspambots
Total attacks: 10
2020-03-21 01:48:14
162.243.130.120 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-21 01:58:11
80.81.0.94 attack
Invalid user katarina from 80.81.0.94 port 1166
2020-03-21 01:43:50
110.78.23.131 attackbots
SSH Brute-Force Attack
2020-03-21 02:06:45
201.212.10.33 attackbotsspam
Mar 20 16:12:24 pornomens sshd\[27565\]: Invalid user peter from 201.212.10.33 port 51470
Mar 20 16:12:24 pornomens sshd\[27565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.212.10.33
Mar 20 16:12:26 pornomens sshd\[27565\]: Failed password for invalid user peter from 201.212.10.33 port 51470 ssh2
...
2020-03-21 02:13:00
51.83.98.104 attackbotsspam
Invalid user xb from 51.83.98.104 port 58444
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104
Failed password for invalid user xb from 51.83.98.104 port 58444 ssh2
Invalid user dagmara from 51.83.98.104 port 51718
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104
2020-03-21 02:10:11
178.57.100.79 attackbots
firewall-block, port(s): 445/tcp
2020-03-21 01:55:52

Recently Reported IPs

109.16.191.79 154.101.242.235 128.150.102.202 7.144.39.23
165.176.168.169 227.42.63.200 204.71.33.216 129.189.58.164
25.30.100.55 119.181.157.229 101.141.216.175 187.65.202.149
13.166.4.64 143.137.47.78 150.60.146.93 104.124.18.195
29.245.51.20 180.155.51.9 124.1.142.129 135.126.160.209