Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.81.56.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.81.56.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:42:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 118.56.81.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.56.81.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.35.179.165 attackbots
Auto Detect Rule!
proto TCP (SYN), 114.35.179.165:22636->gjan.info:23, len 40
2020-09-28 04:39:09
52.230.7.48 attackbotsspam
Invalid user 251 from 52.230.7.48 port 47283
2020-09-28 04:22:53
117.223.136.107 attackspam
Multiple SSH authentication failures from 117.223.136.107
2020-09-28 04:51:10
139.59.129.44 attackspambots
Sep 27 13:21:48 ws24vmsma01 sshd[26749]: Failed password for root from 139.59.129.44 port 59012 ssh2
...
2020-09-28 04:20:40
52.130.73.105 attack
2375/tcp 2375/tcp
[2020-07-31/09-26]2pkt
2020-09-28 04:27:14
218.87.149.136 attackspam
 TCP (SYN) 218.87.149.136:50229 -> port 1433, len 40
2020-09-28 04:41:22
88.147.254.66 attackbotsspam
Invalid user oracle from 88.147.254.66 port 55912
2020-09-28 04:39:40
94.51.25.1 attackspambots
 TCP (SYN) 94.51.25.1:52731 -> port 1080, len 52
2020-09-28 04:21:09
213.14.114.226 attackspam
Unauthorized connection attempt from IP address 213.14.114.226 on Port 445(SMB)
2020-09-28 04:43:39
68.116.41.6 attackbots
fail2ban -- 68.116.41.6
...
2020-09-28 04:30:16
148.72.168.23 attackspambots
ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 457
2020-09-28 04:24:21
189.8.16.174 attackspam
23/tcp 23/tcp 23/tcp...
[2020-08-20/09-26]4pkt,1pt.(tcp)
2020-09-28 04:33:24
138.197.189.136 attackbotsspam
Sep 27 22:43:11 buvik sshd[2511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136
Sep 27 22:43:13 buvik sshd[2511]: Failed password for invalid user debian from 138.197.189.136 port 53246 ssh2
Sep 27 22:46:26 buvik sshd[3013]: Invalid user james from 138.197.189.136
...
2020-09-28 04:52:59
124.196.17.78 attack
Invalid user postgres from 124.196.17.78 port 47840
2020-09-28 04:34:54
36.255.156.126 attack
Invalid user ubuntu from 36.255.156.126 port 47958
2020-09-28 04:32:57

Recently Reported IPs

121.61.158.247 50.31.154.253 204.51.35.161 39.88.182.38
254.171.57.183 43.89.19.231 115.166.53.48 204.252.194.243
95.25.228.123 165.149.2.126 249.127.154.167 22.185.147.197
213.170.189.28 232.242.10.143 144.117.87.76 172.211.217.1
233.45.31.194 253.211.15.64 62.241.62.209 39.166.51.65