Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Zhejiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.242.117.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43514
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.242.117.13.			IN	A

;; AUTHORITY SECTION:
.			2395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091500 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 01:32:23 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 13.117.242.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 13.117.242.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.64.153.14 attackbotsspam
Invalid user jolin from 82.64.153.14 port 49094
2020-07-24 21:40:43
101.78.9.235 attack
Jul 24 13:11:09 *hidden* sshd[44057]: Failed password for invalid user test_user from 101.78.9.235 port 37746 ssh2 Jul 24 13:23:13 *hidden* sshd[7889]: Invalid user deborah from 101.78.9.235 port 51808 Jul 24 13:23:13 *hidden* sshd[7889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.9.235 Jul 24 13:23:15 *hidden* sshd[7889]: Failed password for invalid user deborah from 101.78.9.235 port 51808 ssh2 Jul 24 13:30:28 *hidden* sshd[25649]: Invalid user web from 101.78.9.235 port 50335
2020-07-24 21:44:55
1.196.238.130 attack
Invalid user kali from 1.196.238.130 port 53992
2020-07-24 21:24:08
188.35.187.50 attackbots
Jul 24 14:57:24 marvibiene sshd[4724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.35.187.50 
Jul 24 14:57:26 marvibiene sshd[4724]: Failed password for invalid user vbox from 188.35.187.50 port 39164 ssh2
2020-07-24 21:29:02
159.192.143.249 attackspam
Jul 24 12:34:17 home sshd[457074]: Failed password for invalid user barry from 159.192.143.249 port 34406 ssh2
Jul 24 12:38:41 home sshd[457491]: Invalid user test from 159.192.143.249 port 43546
Jul 24 12:38:41 home sshd[457491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249 
Jul 24 12:38:41 home sshd[457491]: Invalid user test from 159.192.143.249 port 43546
Jul 24 12:38:43 home sshd[457491]: Failed password for invalid user test from 159.192.143.249 port 43546 ssh2
...
2020-07-24 21:46:09
2604:a880:2:d0::4c81:c001 attackbots
2604:a880:2:d0::4c81:c001 - - [24/Jul/2020:12:09:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2604:a880:2:d0::4c81:c001 - - [24/Jul/2020:12:09:53 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2604:a880:2:d0::4c81:c001 - - [24/Jul/2020:12:09:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-24 21:30:52
115.205.146.229 attack
2020-07-24T13:17:03.017966+02:00  sshd[25251]: Failed password for invalid user www from 115.205.146.229 port 51778 ssh2
2020-07-24 21:08:16
138.68.44.236 attackspambots
$f2bV_matches
2020-07-24 21:23:32
180.76.53.42 attackbotsspam
Invalid user admin from 180.76.53.42 port 39620
2020-07-24 21:04:37
134.122.111.162 attackspam
Invalid user ferdinand from 134.122.111.162 port 43820
2020-07-24 21:04:55
128.199.225.104 attack
Invalid user prince from 128.199.225.104 port 47418
2020-07-24 21:35:58
206.189.124.254 attackbotsspam
2020-07-24T06:30:24.113401server.mjenks.net sshd[3384881]: Invalid user minecraft from 206.189.124.254 port 34962
2020-07-24T06:30:24.119143server.mjenks.net sshd[3384881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.124.254
2020-07-24T06:30:24.113401server.mjenks.net sshd[3384881]: Invalid user minecraft from 206.189.124.254 port 34962
2020-07-24T06:30:26.339844server.mjenks.net sshd[3384881]: Failed password for invalid user minecraft from 206.189.124.254 port 34962 ssh2
2020-07-24T06:35:06.968404server.mjenks.net sshd[3385358]: Invalid user ftpuser from 206.189.124.254 port 50374
...
2020-07-24 21:03:05
101.96.143.79 attackbotsspam
Jul 24 12:13:11 h2646465 sshd[321]: Invalid user sym from 101.96.143.79
Jul 24 12:13:11 h2646465 sshd[321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.143.79
Jul 24 12:13:11 h2646465 sshd[321]: Invalid user sym from 101.96.143.79
Jul 24 12:13:13 h2646465 sshd[321]: Failed password for invalid user sym from 101.96.143.79 port 50877 ssh2
Jul 24 12:20:11 h2646465 sshd[1620]: Invalid user testing from 101.96.143.79
Jul 24 12:20:11 h2646465 sshd[1620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.143.79
Jul 24 12:20:11 h2646465 sshd[1620]: Invalid user testing from 101.96.143.79
Jul 24 12:20:13 h2646465 sshd[1620]: Failed password for invalid user testing from 101.96.143.79 port 29934 ssh2
Jul 24 12:23:33 h2646465 sshd[1717]: Invalid user admin from 101.96.143.79
...
2020-07-24 21:05:25
117.70.61.151 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-07-24 21:36:14
121.12.151.250 attackbotsspam
2020-07-24T11:48:41.593825vps-d63064a2 sshd[5029]: Invalid user oracle from 121.12.151.250 port 41194
2020-07-24T11:48:41.601598vps-d63064a2 sshd[5029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.151.250
2020-07-24T11:48:41.593825vps-d63064a2 sshd[5029]: Invalid user oracle from 121.12.151.250 port 41194
2020-07-24T11:48:43.752949vps-d63064a2 sshd[5029]: Failed password for invalid user oracle from 121.12.151.250 port 41194 ssh2
...
2020-07-24 21:15:45

Recently Reported IPs

94.110.44.8 92.18.14.209 54.231.173.43 131.217.223.219
130.70.157.220 87.5.237.57 201.20.86.114 93.222.2.26
140.32.32.19 12.10.178.31 35.111.116.126 170.81.144.111
31.249.7.224 156.198.230.18 180.183.133.207 182.240.107.176
85.245.231.90 50.192.5.177 220.26.64.237 120.121.42.69