Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.131.37.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.131.37.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 161 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 12:33:23 CST 2024
;; MSG SIZE  rcvd: 106
Host info
b'Host 13.37.131.140.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 13.37.131.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.49.251.183 attackspambots
Automatic report - Banned IP Access
2020-09-05 14:11:08
201.43.35.60 attackspambots
SSH Brute-Forcing (server2)
2020-09-05 13:53:55
218.92.0.223 attack
$f2bV_matches
2020-09-05 14:04:13
112.85.42.67 attack
Sep  1 23:19:18 josie sshd[30350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=r.r
Sep  1 23:19:19 josie sshd[30354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=r.r
Sep  1 23:19:19 josie sshd[30351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=r.r
Sep  1 23:19:20 josie sshd[30350]: Failed password for r.r from 112.85.42.67 port 49846 ssh2
Sep  1 23:19:20 josie sshd[30362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=r.r
Sep  1 23:19:21 josie sshd[30354]: Failed password for r.r from 112.85.42.67 port 38200 ssh2
Sep  1 23:19:21 josie sshd[30351]: Failed password for r.r from 112.85.42.67 port 40952 ssh2
Sep  1 23:19:23 josie sshd[30362]: Failed password for r.r from 112.85.42.67 port 35035 ssh2
Sep  1 23:19:23 josie sshd[3........
-------------------------------
2020-09-05 13:59:20
113.22.80.131 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 13:57:41
191.232.193.0 attack
(sshd) Failed SSH login from 191.232.193.0 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 21:13:01 server2 sshd[7381]: Invalid user status from 191.232.193.0
Sep  4 21:13:01 server2 sshd[7381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.193.0 
Sep  4 21:13:03 server2 sshd[7381]: Failed password for invalid user status from 191.232.193.0 port 35612 ssh2
Sep  4 21:33:45 server2 sshd[25441]: Invalid user dines from 191.232.193.0
Sep  4 21:33:45 server2 sshd[25441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.193.0
2020-09-05 14:15:54
63.143.93.166 attackspambots
Sep  4 18:51:32 mellenthin postfix/smtpd[29582]: NOQUEUE: reject: RCPT from unknown[63.143.93.166]: 554 5.7.1 Service unavailable; Client host [63.143.93.166] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/63.143.93.166; from= to= proto=ESMTP helo=
2020-09-05 13:45:17
61.161.250.202 attackspambots
Invalid user elk from 61.161.250.202 port 53314
2020-09-05 14:10:10
164.132.145.70 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-05 14:17:07
120.131.9.167 attackbotsspam
Invalid user anna from 120.131.9.167 port 25978
2020-09-05 14:02:06
197.51.216.156 attack
1599238270 - 09/04/2020 18:51:10 Host: 197.51.216.156/197.51.216.156 Port: 445 TCP Blocked
2020-09-05 14:05:19
113.200.212.170 attackspam
SSH Brute Force
2020-09-05 13:39:14
211.34.252.96 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-09-05 14:16:39
122.51.192.105 attack
SSH Brute-force
2020-09-05 13:57:04
222.186.169.194 attack
$f2bV_matches
2020-09-05 14:18:00

Recently Reported IPs

90.160.151.168 210.51.152.33 204.178.35.24 103.137.105.85
142.94.197.32 173.176.1.35 17.99.143.176 25.139.123.154
232.214.115.173 219.19.76.127 154.137.87.205 20.23.118.202
188.42.23.34 140.202.173.168 245.41.161.166 122.133.239.238
179.234.79.171 121.176.83.180 206.90.228.94 37.216.90.119