Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.134.105.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.134.105.136.		IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 22:58:55 CST 2024
;; MSG SIZE  rcvd: 108
Host info
b'Host 136.105.134.118.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 136.105.134.118.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.26.66.131 attackspambots
Apr 21 14:10:58 server1 sshd\[8942\]: Failed password for root from 118.26.66.131 port 2224 ssh2
Apr 21 14:12:55 server1 sshd\[9489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.66.131  user=ubuntu
Apr 21 14:12:57 server1 sshd\[9489\]: Failed password for ubuntu from 118.26.66.131 port 2225 ssh2
Apr 21 14:14:50 server1 sshd\[10277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.26.66.131  user=ubuntu
Apr 21 14:14:52 server1 sshd\[10277\]: Failed password for ubuntu from 118.26.66.131 port 2226 ssh2
...
2020-04-22 04:22:04
162.243.131.5 attack
firewall-block, port(s): 3128/tcp
2020-04-22 04:42:40
45.229.120.138 attack
RDPBruteGSL24
2020-04-22 04:38:29
159.203.30.50 attackbotsspam
firewall-block, port(s): 17516/tcp
2020-04-22 04:46:09
200.54.242.46 attackbots
Apr 21 17:05:22 dns1 sshd[8005]: Failed password for root from 200.54.242.46 port 44868 ssh2
Apr 21 17:10:15 dns1 sshd[8333]: Failed password for root from 200.54.242.46 port 52206 ssh2
Apr 21 17:15:09 dns1 sshd[8696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.242.46
2020-04-22 04:21:44
129.211.85.214 attackbots
SSH bruteforce
2020-04-22 04:23:53
62.234.126.21 attack
Apr 21 21:10:30 ns392434 sshd[26371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.126.21  user=root
Apr 21 21:10:31 ns392434 sshd[26371]: Failed password for root from 62.234.126.21 port 46180 ssh2
Apr 21 21:27:31 ns392434 sshd[27431]: Invalid user cx from 62.234.126.21 port 44924
Apr 21 21:27:31 ns392434 sshd[27431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.126.21
Apr 21 21:27:31 ns392434 sshd[27431]: Invalid user cx from 62.234.126.21 port 44924
Apr 21 21:27:33 ns392434 sshd[27431]: Failed password for invalid user cx from 62.234.126.21 port 44924 ssh2
Apr 21 21:46:58 ns392434 sshd[28727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.126.21  user=root
Apr 21 21:47:00 ns392434 sshd[28727]: Failed password for root from 62.234.126.21 port 37778 ssh2
Apr 21 21:50:45 ns392434 sshd[29063]: Invalid user yl from 62.234.126.21 port 41980
2020-04-22 04:22:34
104.236.142.89 attack
Apr 21 22:05:50 haigwepa sshd[7753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.89 
Apr 21 22:05:52 haigwepa sshd[7753]: Failed password for invalid user git from 104.236.142.89 port 42710 ssh2
...
2020-04-22 04:25:52
107.174.108.170 attackspambots
Unauthorized access detected from black listed ip!
2020-04-22 04:39:16
49.233.216.158 attack
Apr 21 21:45:03 ns381471 sshd[23841]: Failed password for root from 49.233.216.158 port 47774 ssh2
2020-04-22 04:23:04
102.190.123.220 attackbots
honeypot 22 port
2020-04-22 04:24:43
193.29.15.169 attack
193.29.15.169 was recorded 11 times by 10 hosts attempting to connect to the following ports: 123. Incident counter (4h, 24h, all-time): 11, 20, 2771
2020-04-22 04:39:42
157.230.230.152 attackspam
"fail2ban match"
2020-04-22 04:30:15
61.1.69.223 attack
Apr 21 20:51:13 Ubuntu-1404-trusty-64-minimal sshd\[11258\]: Invalid user gc from 61.1.69.223
Apr 21 20:51:13 Ubuntu-1404-trusty-64-minimal sshd\[11258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.1.69.223
Apr 21 20:51:15 Ubuntu-1404-trusty-64-minimal sshd\[11258\]: Failed password for invalid user gc from 61.1.69.223 port 56088 ssh2
Apr 21 21:50:21 Ubuntu-1404-trusty-64-minimal sshd\[30219\]: Invalid user ftpuser2 from 61.1.69.223
Apr 21 21:50:21 Ubuntu-1404-trusty-64-minimal sshd\[30219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.1.69.223
2020-04-22 04:45:37
49.67.13.95 attackbotsspam
Apr 21 21:50:51 debian-2gb-nbg1-2 kernel: \[9757608.434242\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=49.67.13.95 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=27749 PROTO=TCP SPT=44665 DPT=23 WINDOW=38525 RES=0x00 SYN URGP=0
2020-04-22 04:18:24

Recently Reported IPs

60.227.232.143 124.144.18.198 235.154.34.206 4.10.144.246
243.79.127.95 56.73.185.155 149.239.35.211 214.2.35.79
247.255.217.92 248.35.84.40 98.88.66.92 225.201.93.195
80.217.123.68 136.106.112.165 48.250.211.91 119.247.96.229
156.107.101.162 195.46.110.84 30.202.18.188 233.21.60.158