Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.48.132.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42282
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.48.132.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 19:50:34 CST 2025
;; MSG SIZE  rcvd: 105
Host info
6.132.48.116.in-addr.arpa domain name pointer 006.132.48.116.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.132.48.116.in-addr.arpa	name = 006.132.48.116.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.136.168.123 attack
Unauthorized connection attempt detected from IP address 188.136.168.123 to port 80 [J]
2020-01-19 18:35:34
94.191.40.39 attackspam
Unauthorized connection attempt detected from IP address 94.191.40.39 to port 2220 [J]
2020-01-19 18:20:24
49.81.92.41 attackbotsspam
Unauthorized connection attempt detected from IP address 49.81.92.41 to port 80 [J]
2020-01-19 18:52:10
196.202.57.202 attackspam
Unauthorized connection attempt detected from IP address 196.202.57.202 to port 88 [J]
2020-01-19 18:33:56
185.116.156.90 attackspam
Unauthorized connection attempt detected from IP address 185.116.156.90 to port 2220 [J]
2020-01-19 18:36:27
193.19.119.136 normal
Ok now explain
2020-01-19 18:44:06
118.24.81.234 attackspambots
Jan 19 10:20:08 ns37 sshd[1946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234
Jan 19 10:20:11 ns37 sshd[1946]: Failed password for invalid user ef from 118.24.81.234 port 48330 ssh2
Jan 19 10:27:25 ns37 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234
2020-01-19 18:40:12
61.219.178.89 attackspam
Unauthorized connection attempt detected from IP address 61.219.178.89 to port 4567 [J]
2020-01-19 18:49:53
109.94.122.141 attackspambots
Unauthorized connection attempt detected from IP address 109.94.122.141 to port 23 [J]
2020-01-19 18:41:59
42.119.180.34 attack
Unauthorized connection attempt detected from IP address 42.119.180.34 to port 23 [J]
2020-01-19 18:28:45
193.19.119.136 normal
Ok now explain I'm trtinf to figure this out
2020-01-19 18:48:21
193.19.119.136 normal
This is rocky from pof
2020-01-19 18:54:52
90.46.109.46 attackbots
unauthorized connection attempt
2020-01-19 18:44:33
72.79.67.79 attackbotsspam
Unauthorized connection attempt detected from IP address 72.79.67.79 to port 81 [J]
2020-01-19 18:49:36
41.169.156.98 attackspambots
Unauthorized connection attempt detected from IP address 41.169.156.98 to port 23 [J]
2020-01-19 18:53:38

Recently Reported IPs

224.5.186.210 175.183.82.205 173.2.226.140 67.75.140.219
73.136.147.143 53.111.206.92 153.71.88.107 162.32.89.178
9.246.54.200 252.99.169.219 229.201.234.225 209.25.208.106
103.252.156.77 88.68.166.153 126.162.115.135 44.93.162.9
230.113.100.120 8.24.106.85 232.86.235.104 147.210.68.135