Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '116.118.0.0 - 116.118.63.255'

% Abuse contact for '116.118.0.0 - 116.118.63.255' is 'hm-changed@vnnic.vn'

inetnum:        116.118.0.0 - 116.118.63.255
netname:        ADSL-NET
country:        VN
descr:          ADSL service
admin-c:        HVL2-AP
tech-c:         NTKD1-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-VN-SPT
mnt-irt:        IRT-VNNIC-AP
last-modified:  2017-10-16T07:24:33Z
source:         APNIC

irt:            IRT-VNNIC-AP
address:        Ha Noi, VietNam
phone:          +84-24-35564944
fax-no:         +84-24-37821462
e-mail:         hm-changed@vnnic.vn
abuse-mailbox:  hm-changed@vnnic.vn
admin-c:        NTTT1-AP
tech-c:         NTTT1-AP
auth:           # Filtered
mnt-by:         MAINT-VN-VNNIC
last-modified:  2026-04-21T02:07:47Z
source:         APNIC

person:         Ho Van Lanh
address:        10 Co Giang, Dist 1, Ho Chi Minh City
country:        VN
phone:          +84-937668468
e-mail:         lanh.ho@spt.vn
nic-hdl:        HVL2-AP
mnt-by:         MAINT-VN-SPT
notify:         hanhdd@vnnic.vn
last-modified:  2017-09-14T09:35:53Z
source:         APNIC

person:         Nguyen Thi Kim Dan
nic-hdl:        NTKD1-AP
e-mail:         kimdan@spt.vn
address:        SPT-VN
address:        10 Co Giang, Dist.1, Ho Chi Minh City
phone:          +84-28-54040121
country:        VN
mnt-by:         MAINT-VN-SPT
last-modified:  2022-09-20T06:34:22Z
source:         APNIC

% Information related to '116.118.0.0/17AS7602'

route:          116.118.0.0/17
descr:          SPT-VN
origin:         AS7602
mnt-by:         MAINT-VN-SPT
last-modified:  2022-09-24T18:47:21Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.118.39.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.118.39.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050700 1800 900 604800 86400

;; Query time: 335 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 23:54:23 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 134.39.118.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.39.118.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.22.48.86 attackbotsspam
Unauthorized connection attempt detected from IP address 81.22.48.86 to port 23
2020-01-01 19:10:59
163.125.190.155 attack
Unauthorized connection attempt detected from IP address 163.125.190.155 to port 1433
2020-01-01 18:58:56
115.238.229.8 attackbotsspam
Unauthorized connection attempt detected from IP address 115.238.229.8 to port 26
2020-01-01 19:28:02
139.155.94.150 attackspam
Unauthorized connection attempt detected from IP address 139.155.94.150 to port 80
2020-01-01 19:23:10
118.70.11.25 attackspambots
Unauthorized connection attempt detected from IP address 118.70.11.25 to port 445
2020-01-01 19:05:18
139.129.97.48 attack
Unauthorized connection attempt detected from IP address 139.129.97.48 to port 8545
2020-01-01 19:01:48
157.230.143.29 attack
Unauthorized connection attempt detected from IP address 157.230.143.29 to port 9000
2020-01-01 19:22:49
113.222.243.119 attackspam
Unauthorized connection attempt detected from IP address 113.222.243.119 to port 23
2020-01-01 19:28:24
218.93.56.247 attack
Unauthorized connection attempt detected from IP address 218.93.56.247 to port 80
2020-01-01 19:18:14
110.52.28.207 attackbots
Unauthorized connection attempt detected from IP address 110.52.28.207 to port 23
2020-01-01 19:08:56
46.191.137.3 attackbotsspam
Unauthorized connection attempt detected from IP address 46.191.137.3 to port 23
2020-01-01 19:33:31
111.38.107.120 attackspambots
Unauthorized connection attempt detected from IP address 111.38.107.120 to port 23
2020-01-01 19:08:31
118.70.10.10 attackbots
Unauthorized connection attempt detected from IP address 118.70.10.10 to port 445
2020-01-01 19:26:41
27.211.164.230 attack
Unauthorized connection attempt detected from IP address 27.211.164.230 to port 23
2020-01-01 19:14:27
149.202.180.143 attackbots
Jan  1 08:18:34 legacy sshd[19471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143
Jan  1 08:18:36 legacy sshd[19471]: Failed password for invalid user oracle from 149.202.180.143 port 33990 ssh2
Jan  1 08:21:05 legacy sshd[19515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143
...
2020-01-01 19:01:30

Recently Reported IPs

2606:4700:10::6814:4520 54.192.18.114 15.156.231.53 13.33.183.19
18.65.216.36 13.225.183.115 103.167.135.141 103.167.135.121
35.241.159.58 2606:4700:10::6816:4916 2606:4700:10::6816:613 2606:4700:10::ac43:1775
2606:4700:10::6816:1707 2606:4700:10::ac43:2451 2606:4700:20::681a:900 120.24.47.149
87.250.224.219 45.194.66.144 114.126.244.80 38.224.162.1