Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.118.49.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.118.49.141.			IN	A

;; AUTHORITY SECTION:
.			394	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 23:15:38 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 141.49.118.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 116.118.49.141.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.100.208.8 attack
[Thu Jul 11 05:25:08 2019] Failed password for invalid user support from 114.100.208.8 port 48765 ssh2
[Thu Jul 11 05:25:14 2019] Failed password for invalid user ubnt from 114.100.208.8 port 57670 ssh2
[Thu Jul 11 05:25:20 2019] Failed password for invalid user cisco from 114.100.208.8 port 41430 ssh2
[Thu Jul 11 05:25:28 2019] Failed password for invalid user pi from 114.100.208.8 port 53825 ssh2
[Thu Jul 11 05:25:37 2019] Failed password for r.r from 114.100.208.8 port 39796 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.100.208.8
2019-07-11 20:36:14
14.186.45.211 attackspam
19/7/10@23:42:09: FAIL: Alarm-SSH address from=14.186.45.211
...
2019-07-11 20:33:15
122.159.137.89 attackbotsspam
23/tcp
[2019-07-11]1pkt
2019-07-11 20:39:03
188.166.121.132 attack
11.07.2019 12:06:28 SSH access blocked by firewall
2019-07-11 20:57:43
182.246.58.119 attack
Jul 11 01:32:54 l01 sshd[357237]: Invalid user admin from 182.246.58.119
Jul 11 01:32:54 l01 sshd[357237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.246.58.119 
Jul 11 01:32:56 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:32:58 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:33:00 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:33:02 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:33:04 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:33:07 l01 sshd[357237]: Failed password for invalid user admin from 182.246.58.119 port 35050 ssh2
Jul 11 01:33:07 l01 sshd[357237]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.24........
-------------------------------
2019-07-11 20:10:16
116.224.50.47 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 20:11:56
153.36.240.126 attackspambots
19/7/11@07:54:27: FAIL: IoT-SSH address from=153.36.240.126
...
2019-07-11 20:20:55
41.32.119.220 attackbots
445/tcp 445/tcp
[2019-07-11]2pkt
2019-07-11 20:30:20
103.1.40.189 attackspam
Invalid user ds from 103.1.40.189 port 59554
2019-07-11 20:29:07
187.86.131.109 attackbots
firewall-block, port(s): 3389/tcp
2019-07-11 20:13:55
152.250.73.88 attackbots
DATE:2019-07-11 05:38:52, IP:152.250.73.88, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-07-11 20:43:10
191.53.223.128 attack
Jul 10 23:41:27 web1 postfix/smtpd[18248]: warning: unknown[191.53.223.128]: SASL PLAIN authentication failed: authentication failure
...
2019-07-11 20:52:37
122.118.130.103 attackbots
37215/tcp
[2019-07-11]1pkt
2019-07-11 20:18:38
104.248.144.130 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 20:34:07
122.53.103.130 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 20:14:56

Recently Reported IPs

116.118.49.140 116.118.49.184 116.118.49.194 116.118.49.245
116.118.49.247 116.118.49.248 116.118.49.250 116.118.49.37
116.12.48.131 116.12.50.189 116.12.50.234 116.12.50.236
116.12.51.150 116.12.51.45 116.12.52.35 116.12.52.40
116.120.40.202 116.120.57.60 116.120.58.111 116.120.58.141