Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
122.117.137.47 attackspambots
Honeypot attack, port: 5555, PTR: 122-117-137-47.HINET-IP.hinet.net.
2020-09-17 18:22:24
122.117.137.47 attack
Honeypot attack, port: 5555, PTR: 122-117-137-47.HINET-IP.hinet.net.
2020-09-17 09:34:33
122.117.130.168 attackbots
Unauthorized connection attempt detected from IP address 122.117.130.168 to port 23
2020-08-04 15:44:06
122.117.134.109 attackspam
port scan and connect, tcp 23 (telnet)
2020-07-04 13:01:45
122.117.130.57 attack
Port Scan
2020-05-29 22:27:23
122.117.138.133 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-21 02:16:56
122.117.137.245 attackbots
Port probing on unauthorized port 81
2020-05-13 20:02:16
122.117.132.144 attackspambots
firewall-block, port(s): 23/tcp
2020-02-22 13:14:24
122.117.13.244 attack
Telnet Server BruteForce Attack
2020-02-21 23:41:01
122.117.13.91 attackspam
Unauthorized connection attempt detected from IP address 122.117.13.91 to port 81 [J]
2020-01-31 00:03:59
122.117.13.91 attack
Honeypot attack, port: 81, PTR: 122-117-13-91.HINET-IP.hinet.net.
2019-10-01 03:26:52
122.117.137.225 attackspam
port scan and connect, tcp 23 (telnet)
2019-09-09 21:38:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.117.13.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.117.13.38.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:57:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
38.13.117.122.in-addr.arpa domain name pointer 122-117-13-38.hinet-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
38.13.117.122.in-addr.arpa	name = 122-117-13-38.hinet-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.8.109.121 attack
firewall-block, port(s): 23/tcp
2019-06-21 16:03:36
146.88.240.2 attack
Fri 21 00:19:23 1701/udp
2019-06-21 15:54:28
88.208.39.9 attackspam
IP: 88.208.39.9
ASN: AS39572 DataWeb Global Group B.V.
Port: Message Submission 587
Date: 21/06/2019 4:39:27 AM UTC
2019-06-21 16:14:09
113.221.28.83 attackspam
FTP brute-force attack
2019-06-21 15:32:28
88.208.57.69 attackbots
IP: 88.208.57.69
ASN: AS39572 DataWeb Global Group B.V.
Port: Message Submission 587
Date: 21/06/2019 4:39:30 AM UTC
2019-06-21 16:12:17
14.191.156.112 attackspambots
Jun 21 07:40:58 srv-4 sshd\[12697\]: Invalid user admin from 14.191.156.112
Jun 21 07:40:58 srv-4 sshd\[12697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.191.156.112
Jun 21 07:41:00 srv-4 sshd\[12697\]: Failed password for invalid user admin from 14.191.156.112 port 55535 ssh2
...
2019-06-21 15:32:05
180.253.142.79 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-21 15:30:43
113.182.193.42 attackbots
445/tcp
[2019-06-21]1pkt
2019-06-21 15:31:29
125.42.237.242 attack
Scanning random ports - tries to find possible vulnerable services
2019-06-21 15:40:32
108.163.251.66 attackspambots
Blocking for trying to access an exploit file: /content-post.php
2019-06-21 15:34:44
150.95.129.150 attackspambots
Jun 21 07:06:00 XXXXXX sshd[42385]: Invalid user ftptest from 150.95.129.150 port 37520
2019-06-21 16:02:42
190.201.167.208 attack
445/tcp
[2019-06-21]1pkt
2019-06-21 15:46:06
36.84.227.169 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-21 15:33:28
141.105.99.97 attack
NAME : IBRED CIDR : 141.105.99.0/24 DDoS attack Spain - block certain countries :) IP: 141.105.99.97  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-21 15:40:07
118.89.243.245 attack
1433/tcp 7002/tcp 9200/tcp
[2019-06-21]3pkt
2019-06-21 15:56:36

Recently Reported IPs

78.129.239.197 200.6.87.30 103.139.9.165 103.198.11.233
94.232.172.241 87.103.4.120 27.35.47.218 14.104.207.226
78.9.62.20 183.88.156.93 219.157.38.156 180.251.150.25
107.174.142.67 211.227.227.182 64.227.161.211 59.138.86.142
173.255.253.24 5.181.80.185 1.15.250.213 95.31.163.80