Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
220.136.31.93 attackspambots
Port probing on unauthorized port 8080
2020-06-15 08:11:07
220.136.39.65 attackbotsspam
Unauthorized connection attempt from IP address 220.136.39.65 on Port 445(SMB)
2020-04-29 22:31:12
220.136.31.162 attack
1585486135 - 03/29/2020 14:48:55 Host: 220.136.31.162/220.136.31.162 Port: 445 TCP Blocked
2020-03-29 21:05:18
220.136.31.154 attack
Automatic report - Port Scan Attack
2020-02-20 07:08:18
220.136.35.57 attackbots
220.136.35.57 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 20:17:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.136.3.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.136.3.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:15:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
45.3.136.220.in-addr.arpa domain name pointer 220-136-3-45.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.3.136.220.in-addr.arpa	name = 220-136-3-45.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.68.8.239 attack
SSH Authentication Attempts Exceeded
2020-03-05 16:47:53
111.240.9.9 attackspambots
Honeypot attack, port: 5555, PTR: 111-240-9-9.dynamic-ip.hinet.net.
2020-03-05 16:47:10
222.73.44.71 attack
firewall-block, port(s): 445/tcp
2020-03-05 16:28:48
92.63.194.22 attackbotsspam
Mar  5 09:14:13 OPSO sshd\[1870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.22  user=admin
Mar  5 09:14:15 OPSO sshd\[1870\]: Failed password for admin from 92.63.194.22 port 36999 ssh2
Mar  5 09:14:34 OPSO sshd\[1884\]: Invalid user Admin from 92.63.194.22 port 46733
Mar  5 09:14:34 OPSO sshd\[1884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.22
Mar  5 09:14:36 OPSO sshd\[1884\]: Failed password for invalid user Admin from 92.63.194.22 port 46733 ssh2
2020-03-05 16:38:39
116.87.14.197 attackbotsspam
firewall-block, port(s): 23/tcp
2020-03-05 16:38:20
92.63.194.11 attackbots
2020-03-05T08:38:29.073177shield sshd\[4434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.11  user=root
2020-03-05T08:38:31.212884shield sshd\[4434\]: Failed password for root from 92.63.194.11 port 37175 ssh2
2020-03-05T08:39:49.561158shield sshd\[4785\]: Invalid user guest from 92.63.194.11 port 35653
2020-03-05T08:39:49.564259shield sshd\[4785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.11
2020-03-05T08:39:52.020016shield sshd\[4785\]: Failed password for invalid user guest from 92.63.194.11 port 35653 ssh2
2020-03-05 16:49:48
210.187.87.185 attack
$f2bV_matches
2020-03-05 16:28:09
80.244.187.181 attackbotsspam
Mar  5 09:10:52 sd-53420 sshd\[15846\]: Invalid user wangdc from 80.244.187.181
Mar  5 09:10:52 sd-53420 sshd\[15846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.187.181
Mar  5 09:10:53 sd-53420 sshd\[15846\]: Failed password for invalid user wangdc from 80.244.187.181 port 48632 ssh2
Mar  5 09:18:29 sd-53420 sshd\[16510\]: Invalid user wangyi from 80.244.187.181
Mar  5 09:18:29 sd-53420 sshd\[16510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.187.181
...
2020-03-05 16:25:39
46.164.143.82 attackbots
Mar  4 22:00:19 wbs sshd\[6686\]: Invalid user info from 46.164.143.82
Mar  4 22:00:19 wbs sshd\[6686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82
Mar  4 22:00:21 wbs sshd\[6686\]: Failed password for invalid user info from 46.164.143.82 port 43882 ssh2
Mar  4 22:06:50 wbs sshd\[7303\]: Invalid user rajesh from 46.164.143.82
Mar  4 22:06:50 wbs sshd\[7303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.164.143.82
2020-03-05 16:11:34
68.183.190.43 attackspam
$f2bV_matches
2020-03-05 16:18:35
159.89.115.126 attackspambots
Mar  5 01:50:28 ws24vmsma01 sshd[162552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126
Mar  5 01:50:30 ws24vmsma01 sshd[162552]: Failed password for invalid user csserver from 159.89.115.126 port 43918 ssh2
...
2020-03-05 16:18:55
125.77.30.107 attack
firewall-block, port(s): 60001/tcp
2020-03-05 16:34:59
112.85.42.182 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.182  user=root
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
Failed password for root from 112.85.42.182 port 38551 ssh2
2020-03-05 16:13:01
59.93.8.225 attack
Email rejected due to spam filtering
2020-03-05 16:17:13
36.75.140.79 attackspambots
1583383813 - 03/05/2020 05:50:13 Host: 36.75.140.79/36.75.140.79 Port: 445 TCP Blocked
2020-03-05 16:36:21

Recently Reported IPs

252.67.67.36 165.140.42.251 205.43.217.197 246.55.164.47
201.90.125.44 45.13.75.189 201.170.107.199 104.245.35.168
167.200.91.86 140.194.97.197 80.58.224.212 185.48.166.35
134.64.67.73 44.70.87.146 159.168.32.121 107.164.183.110
79.24.202.162 208.198.63.156 74.51.195.179 17.130.145.126