Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Laiwu

Region: Shandong

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.134.119.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;123.134.119.13.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031601 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 05:21:49 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 13.119.134.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.119.134.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.173.118.105 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-23 22:13:57
47.22.135.70 attackbots
Nov 23 14:11:54 serwer sshd\[23127\]: Invalid user ftp_user from 47.22.135.70 port 65161
Nov 23 14:11:54 serwer sshd\[23127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.22.135.70
Nov 23 14:11:57 serwer sshd\[23127\]: Failed password for invalid user ftp_user from 47.22.135.70 port 65161 ssh2
...
2019-11-23 21:54:40
141.136.44.11 attack
$f2bV_matches
2019-11-23 21:57:28
14.142.94.222 attack
$f2bV_matches
2019-11-23 22:30:29
182.61.33.2 attackspam
Invalid user dangers from 182.61.33.2 port 53232
2019-11-23 22:27:24
180.250.124.227 attackspam
Invalid user www from 180.250.124.227 port 53602
2019-11-23 21:56:32
54.37.230.15 attackspam
Nov 23 15:28:34 ns41 sshd[6746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.15
Nov 23 15:28:34 ns41 sshd[6746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.15
2019-11-23 22:29:45
118.21.111.124 attack
SSH brutforce
2019-11-23 22:11:06
139.59.211.245 attackbotsspam
Nov 19 23:11:10 xb0 sshd[10119]: Failed password for invalid user apache from 139.59.211.245 port 53238 ssh2
Nov 19 23:11:10 xb0 sshd[10119]: Received disconnect from 139.59.211.245: 11: Bye Bye [preauth]
Nov 19 23:20:02 xb0 sshd[18665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.211.245  user=mysql
Nov 19 23:20:03 xb0 sshd[18665]: Failed password for mysql from 139.59.211.245 port 36212 ssh2
Nov 19 23:20:03 xb0 sshd[18665]: Received disconnect from 139.59.211.245: 11: Bye Bye [preauth]
Nov 19 23:23:39 xb0 sshd[15251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.211.245  user=r.r
Nov 19 23:23:41 xb0 sshd[15251]: Failed password for r.r from 139.59.211.245 port 46414 ssh2
Nov 19 23:23:41 xb0 sshd[15251]: Received disconnect from 139.59.211.245: 11: Bye Bye [preauth]
Nov 19 23:27:08 xb0 sshd[11454]: Failed password for invalid user wwwadmin from 139.59.211.245 port 56612........
-------------------------------
2019-11-23 22:28:50
113.164.244.98 attackspam
sshd jail - ssh hack attempt
2019-11-23 22:32:55
117.136.65.212 attackspam
badbot
2019-11-23 22:36:24
152.136.122.130 attack
Nov 23 11:50:22 woltan sshd[29643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.130
2019-11-23 22:16:29
132.148.129.180 attackbotsspam
Nov 23 14:28:21 l02a sshd[15732]: Invalid user proxy from 132.148.129.180
Nov 23 14:28:23 l02a sshd[15732]: Failed password for invalid user proxy from 132.148.129.180 port 50466 ssh2
Nov 23 14:28:21 l02a sshd[15732]: Invalid user proxy from 132.148.129.180
Nov 23 14:28:23 l02a sshd[15732]: Failed password for invalid user proxy from 132.148.129.180 port 50466 ssh2
2019-11-23 22:36:44
1.1.245.223 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-23 22:24:46
190.215.112.122 attackbots
Nov 23 03:21:06 linuxvps sshd\[59306\]: Invalid user kh from 190.215.112.122
Nov 23 03:21:06 linuxvps sshd\[59306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122
Nov 23 03:21:08 linuxvps sshd\[59306\]: Failed password for invalid user kh from 190.215.112.122 port 53108 ssh2
Nov 23 03:25:42 linuxvps sshd\[62277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122  user=root
Nov 23 03:25:43 linuxvps sshd\[62277\]: Failed password for root from 190.215.112.122 port 43095 ssh2
2019-11-23 22:13:28

Recently Reported IPs

66.219.200.43 61.120.177.141 165.22.180.29 188.233.137.13
169.229.221.212 196.99.1.104 63.181.115.244 105.205.240.31
98.214.72.159 130.15.145.144 64.79.67.69 112.243.74.130
111.234.13.21 113.232.116.115 92.46.84.172 146.249.252.64
91.132.38.148 110.175.148.214 184.201.103.112 27.231.237.236