Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.213.113.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.213.113.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 19:13:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 3.113.213.161.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 161.213.113.3.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
101.28.252.15 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-25 14:05:17
210.217.24.230 attackbots
2019-10-24T22:09:55.928111-07:00 suse-nuc sshd[22900]: Invalid user factorio from 210.217.24.230 port 33152
...
2019-10-25 14:22:34
41.32.145.233 attackspambots
SMTP-SASL bruteforce attempt
2019-10-25 14:06:01
88.255.251.93 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:21.
2019-10-25 13:43:34
125.162.142.106 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:17.
2019-10-25 13:49:26
185.31.163.237 attackspambots
Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP
2019-10-25 13:58:41
220.133.225.5 attackbots
23/tcp 60001/tcp...
[2019-09-06/10-25]42pkt,2pt.(tcp)
2019-10-25 14:18:42
40.112.255.39 attackspam
Oct 24 19:50:44 hanapaa sshd\[433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.255.39  user=root
Oct 24 19:50:46 hanapaa sshd\[433\]: Failed password for root from 40.112.255.39 port 40192 ssh2
Oct 24 19:55:22 hanapaa sshd\[843\]: Invalid user 2! from 40.112.255.39
Oct 24 19:55:22 hanapaa sshd\[843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.255.39
Oct 24 19:55:24 hanapaa sshd\[843\]: Failed password for invalid user 2! from 40.112.255.39 port 40192 ssh2
2019-10-25 14:22:15
211.217.183.95 attackbots
23/tcp 37215/tcp...
[2019-08-28/10-25]13pkt,2pt.(tcp)
2019-10-25 14:04:39
14.166.75.11 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:17.
2019-10-25 13:50:45
14.231.227.5 attackbots
Unauthorized IMAP connection attempt
2019-10-25 13:59:13
36.68.55.4 attack
Chat Spam
2019-10-25 14:13:39
104.200.110.210 attackbotsspam
Invalid user ag from 104.200.110.210 port 59484
2019-10-25 14:15:12
14.244.2.88 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:18.
2019-10-25 13:47:51
42.113.63.108 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-10-2019 04:55:20.
2019-10-25 13:45:31

Recently Reported IPs

180.39.250.9 229.189.112.173 144.102.11.184 141.14.245.134
90.204.195.110 222.246.138.50 108.226.129.114 14.148.60.15
26.122.127.38 228.82.251.165 47.164.93.76 157.236.227.183
19.6.75.236 97.60.24.123 168.218.227.141 29.174.189.157
203.166.164.155 157.16.207.241 191.122.252.50 19.76.154.14