Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.118.16.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.118.16.130.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024020800 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 09 00:25:18 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 130.16.118.111.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.16.118.111.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.140.235.171 attackspambots
Unauthorized connection attempt detected from IP address 187.140.235.171 to port 23
2020-01-05 06:40:00
61.153.223.99 attackspam
Unauthorized connection attempt from IP address 61.153.223.99 on Port 445(SMB)
2020-01-05 06:29:22
201.92.242.235 attackspambots
Unauthorized connection attempt detected from IP address 201.92.242.235 to port 23
2020-01-05 06:34:46
85.93.20.89 attack
200104 16:54:32 [Warning] Access denied for user 'root'@'85.93.20.89' (using password: YES)
200104 16:54:37 [Warning] Access denied for user 'root'@'85.93.20.89' (using password: YES)
200104 16:54:41 [Warning] Access denied for user 'root'@'85.93.20.89' (using password: YES)
...
2020-01-05 06:49:40
213.254.129.55 attackbots
Unauthorized connection attempt detected from IP address 213.254.129.55 to port 82
2020-01-05 06:32:54
187.226.121.109 attack
Unauthorized connection attempt detected from IP address 187.226.121.109 to port 8080
2020-01-05 06:39:02
217.210.113.186 attack
Unauthorized connection attempt detected from IP address 217.210.113.186 to port 5555 [J]
2020-01-05 06:32:17
118.173.242.46 attackspambots
Unauthorized connection attempt from IP address 118.173.242.46 on Port 445(SMB)
2020-01-05 06:13:17
81.10.9.198 attackspam
Unauthorized connection attempt detected from IP address 81.10.9.198 to port 4567
2020-01-05 06:50:45
201.244.33.42 attackspam
Unauthorized connection attempt detected from IP address 201.244.33.42 to port 2004
2020-01-05 06:34:23
185.124.117.232 attack
Unauthorized connection attempt detected from IP address 185.124.117.232 to port 8080
2020-01-05 06:40:53
201.86.229.218 attack
Unauthorized connection attempt detected from IP address 201.86.229.218 to port 23
2020-01-05 06:35:04
125.227.225.13 attackspambots
Unauthorized connection attempt from IP address 125.227.225.13 on Port 445(SMB)
2020-01-05 06:14:37
176.88.75.124 attackbots
Joomla Admin : try to force the door...
2020-01-05 06:17:50
207.6.1.11 attackspam
Jan  4 23:10:48 [host] sshd[2026]: Invalid user hatton from 207.6.1.11
Jan  4 23:10:48 [host] sshd[2026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.1.11
Jan  4 23:10:51 [host] sshd[2026]: Failed password for invalid user hatton from 207.6.1.11 port 36506 ssh2
2020-01-05 06:17:09

Recently Reported IPs

111.118.159.83 111.118.17.82 111.118.168.90 111.118.145.206
111.118.175.176 111.118.137.124 111.118.150.111 111.118.13.139
111.118.116.144 111.118.107.91 111.118.11.228 111.118.115.238
111.118.127.54 111.117.78.188 111.117.61.70 111.117.74.156
111.117.83.163 111.117.42.217 111.117.96.64 111.117.47.141