Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ljungby

Region: Kronoberg

Country: Sweden

Internet Service Provider: Systempartner i Ljungby AB

Hostname: unknown

Organization: Systempartner i Ljungby AB

Usage Type: Commercial

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
31.13.84.49 attackbotsspam
firewall-block, port(s): 33160/tcp, 33284/tcp, 34966/tcp, 34972/tcp, 35384/tcp, 41064/tcp, 42002/tcp, 43036/tcp, 46212/tcp, 49112/tcp, 49990/tcp, 52314/tcp, 56167/tcp, 56240/tcp
2020-02-24 05:54:39
31.13.84.51 attack
firewall-block, port(s): 52737/tcp
2020-02-06 03:03:18
31.13.84.49 attackbots
firewall-block, port(s): 51813/tcp, 52597/tcp, 54248/tcp
2019-12-31 15:47:24
31.13.84.49 attackbots
firewall-block, port(s): 46908/tcp
2019-12-21 21:38:16
31.13.80.5 attackspam
Thu 11 18:55:38 53952/tcp
Thu 11 18:55:38 53952/tcp
Thu 11 18:55:38 53952/tcp
Thu 11 18:55:38 53952/tcp
Thu 11 18:55:38 53952/tcp
Thu 11 18:55:39 53952/tcp
Thu 11 18:55:40 53952/tcp
Thu 11 18:55:43 53952/tcp
2019-07-12 09:20:16
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.13.8.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53496
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.13.8.120.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 03 17:12:04 +08 2019
;; MSG SIZE  rcvd: 115

Host info
120.8.13.31.in-addr.arpa domain name pointer pubbackup001.edgeip.se.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
120.8.13.31.in-addr.arpa	name = pubbackup001.edgeip.se.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
123.207.19.105 attackspambots
Sep 21 11:56:19 dhoomketu sshd[3257488]: Failed password for root from 123.207.19.105 port 35074 ssh2
Sep 21 12:01:04 dhoomketu sshd[3257603]: Invalid user user from 123.207.19.105 port 34424
Sep 21 12:01:04 dhoomketu sshd[3257603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.19.105 
Sep 21 12:01:04 dhoomketu sshd[3257603]: Invalid user user from 123.207.19.105 port 34424
Sep 21 12:01:05 dhoomketu sshd[3257603]: Failed password for invalid user user from 123.207.19.105 port 34424 ssh2
...
2020-09-21 14:44:48
208.68.39.220 attackbotsspam
Port scan denied
2020-09-21 14:38:26
212.64.54.49 attackspambots
Sep 21 08:06:56 OPSO sshd\[24801\]: Invalid user test from 212.64.54.49 port 35770
Sep 21 08:06:56 OPSO sshd\[24801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49
Sep 21 08:06:58 OPSO sshd\[24801\]: Failed password for invalid user test from 212.64.54.49 port 35770 ssh2
Sep 21 08:12:16 OPSO sshd\[26572\]: Invalid user www from 212.64.54.49 port 42606
Sep 21 08:12:16 OPSO sshd\[26572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49
2020-09-21 14:23:35
197.62.35.207 attackspam
Brute%20Force%20SSH
2020-09-21 14:15:20
5.79.212.131 attack
Sep 21 04:02:18 root sshd[16073]: Invalid user pi from 5.79.212.131
...
2020-09-21 14:49:32
194.15.36.98 attack
Failed password for invalid user from 194.15.36.98 port 48100 ssh2
2020-09-21 14:40:39
178.170.146.75 attackbots
Failed password for invalid user from 178.170.146.75 port 65021 ssh2
2020-09-21 14:44:20
161.35.84.246 attack
$f2bV_matches
2020-09-21 14:52:33
180.76.247.16 attackbots
Total attacks: 2
2020-09-21 14:18:01
196.179.230.124 attack
Unauthorized connection attempt from IP address 196.179.230.124 on Port 445(SMB)
2020-09-21 14:22:23
188.225.124.220 attackbotsspam
1600621304 - 09/20/2020 19:01:44 Host: 188.225.124.220/188.225.124.220 Port: 445 TCP Blocked
2020-09-21 14:36:10
111.229.104.94 attackbotsspam
2020-09-21T04:24:27.533982amanda2.illicoweb.com sshd\[31694\]: Invalid user administrador from 111.229.104.94 port 57064
2020-09-21T04:24:27.538711amanda2.illicoweb.com sshd\[31694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.104.94
2020-09-21T04:24:29.154165amanda2.illicoweb.com sshd\[31694\]: Failed password for invalid user administrador from 111.229.104.94 port 57064 ssh2
2020-09-21T04:29:46.466276amanda2.illicoweb.com sshd\[31844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.104.94  user=root
2020-09-21T04:29:48.543157amanda2.illicoweb.com sshd\[31844\]: Failed password for root from 111.229.104.94 port 41306 ssh2
...
2020-09-21 14:32:33
123.30.157.239 attack
Invalid user ant from 123.30.157.239 port 48344
2020-09-21 14:29:58
219.154.101.78 attackbots
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-21 14:31:41
166.175.57.109 attackbots
Brute forcing email accounts
2020-09-21 14:49:56

Recently Reported IPs

119.29.156.233 178.62.239.249 103.60.181.177 219.142.28.206
180.242.103.248 80.211.6.125 114.119.116.92 114.237.188.96
72.87.113.190 188.131.154.248 100.19.12.112 119.62.18.13
196.247.18.34 159.224.194.240 65.255.43.45 177.21.120.102
112.198.29.246 172.104.236.88 83.61.22.215 178.62.251.130