Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: Chunghwa Telecom Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Automatic report - Web App Attack
2019-07-08 08:41:29
Comments on same subnet:
IP Type Details Datetime
220.134.223.249 attack
Tried our host z.
2020-09-27 00:55:50
220.134.223.249 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=3810  .  dstport=5555  .     (3536)
2020-09-26 16:46:13
220.134.224.75 attack
IP 220.134.224.75 attacked honeypot on port: 23 at 8/3/2020 1:34:47 PM
2020-08-04 06:24:50
220.134.225.137 attackspambots
Attempted connection to port 23.
2020-08-01 16:56:54
220.134.22.203 attack
220.134.22.203 - - [07/Jul/2020:03:54:06 +0000] "GET / HTTP/1.1" 400 166 "-" "-"
2020-07-07 14:40:54
220.134.223.21 attackbotsspam
IP 220.134.223.21 attacked honeypot on port: 80 at 7/5/2020 8:53:20 PM
2020-07-06 13:49:06
220.134.220.129 attackspam
Port probing on unauthorized port 88
2020-06-07 07:20:51
220.134.220.58 attackbotsspam
Honeypot attack, port: 81, PTR: 220-134-220-58.HINET-IP.hinet.net.
2020-04-24 05:07:03
220.134.229.217 attack
" "
2020-04-07 17:35:18
220.134.229.221 attackbotsspam
firewall-block, port(s): 23/tcp
2020-02-20 17:01:12
220.134.222.190 attackbotsspam
" "
2020-02-12 17:25:02
220.134.229.217 attack
Unauthorized connection attempt detected from IP address 220.134.229.217 to port 4567 [J]
2020-01-25 20:39:46
220.134.226.171 attackbots
23/tcp
[2019-07-03]1pkt
2019-07-03 16:44:26
220.134.222.140 attackbots
81/tcp
[2019-07-02]1pkt
2019-07-02 19:36:32
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.134.22.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3785
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.134.22.113.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 20 06:12:25 CST 2019
;; MSG SIZE  rcvd: 118

Host info
113.22.134.220.in-addr.arpa domain name pointer 220-134-22-113.HINET-IP.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
113.22.134.220.in-addr.arpa	name = 220-134-22-113.HINET-IP.hinet.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
141.98.10.198 attack
" "
2020-06-20 16:01:18
118.27.4.225 attackspambots
2020-06-20T03:02:30.333321morrigan.ad5gb.com sshd[2064472]: Invalid user hxc from 118.27.4.225 port 41646
2020-06-20T03:02:31.798218morrigan.ad5gb.com sshd[2064472]: Failed password for invalid user hxc from 118.27.4.225 port 41646 ssh2
2020-06-20T03:02:32.761607morrigan.ad5gb.com sshd[2064472]: Disconnected from invalid user hxc 118.27.4.225 port 41646 [preauth]
2020-06-20 16:16:08
45.134.179.57 attackspambots
Jun 20 09:33:15 debian-2gb-nbg1-2 kernel: \[14897080.424554\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.134.179.57 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38102 PROTO=TCP SPT=49128 DPT=33970 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-20 15:43:48
92.124.163.82 attackbotsspam
0,56-01/02 [bc01/m14] PostRequest-Spammer scoring: maputo01_x2b
2020-06-20 15:51:52
202.109.202.60 attackspam
Jun 20 09:59:58 ns3164893 sshd[29899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.109.202.60
Jun 20 10:00:01 ns3164893 sshd[29899]: Failed password for invalid user admin from 202.109.202.60 port 55518 ssh2
...
2020-06-20 16:08:48
179.110.213.232 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-06-20 16:13:54
94.102.51.17 attackspam
 TCP (SYN) 94.102.51.17:52536 -> port 11393, len 44
2020-06-20 15:48:26
182.151.41.208 attackbots
Invalid user user from 182.151.41.208 port 49372
2020-06-20 15:38:20
222.186.190.2 attackspam
Jun 20 09:42:12 server sshd[3477]: Failed none for root from 222.186.190.2 port 27682 ssh2
Jun 20 09:42:14 server sshd[3477]: Failed password for root from 222.186.190.2 port 27682 ssh2
Jun 20 09:42:17 server sshd[3477]: Failed password for root from 222.186.190.2 port 27682 ssh2
2020-06-20 15:42:29
152.136.108.226 attack
Bruteforce detected by fail2ban
2020-06-20 15:44:14
141.98.10.199 attackspam
" "
2020-06-20 15:49:02
171.244.26.249 attackspam
Invalid user centos from 171.244.26.249 port 35720
2020-06-20 16:05:12
92.222.79.157 attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-06-20 15:40:27
150.158.178.137 attackspam
Jun 20 10:01:36 vmd48417 sshd[5368]: Failed password for root from 150.158.178.137 port 39672 ssh2
2020-06-20 16:11:04
111.161.74.100 attackspambots
Invalid user llb from 111.161.74.100 port 45825
2020-06-20 15:52:51

Recently Reported IPs

116.206.92.77 178.128.194.144 48.56.220.43 63.132.37.204
60.81.80.34 41.45.114.252 39.98.163.123 219.63.171.12
94.28.38.106 164.7.167.214 85.194.250.138 233.74.145.208
128.77.28.199 82.218.80.121 185.153.196.40 89.20.36.2
239.154.31.182 212.129.36.131 202.101.20.178 202.204.42.106