Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.145.154.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.145.154.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:53:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 3.154.145.118.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 118.145.154.3.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
14.142.43.18 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 02:12:28,787 INFO [shellcode_manager] (14.142.43.18) no match, writing hexdump (f09e3167028b1d57771489e2b0762e4a :2194253) - MS17010 (EternalBlue)
2019-07-18 19:31:42
106.12.213.162 attackspam
Jul 18 12:39:57 debian sshd\[12945\]: Invalid user u2 from 106.12.213.162 port 52468
Jul 18 12:39:57 debian sshd\[12945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
...
2019-07-18 19:40:28
95.226.88.13 attack
Jul 18 10:58:13 MK-Soft-VM3 sshd\[28803\]: Invalid user anderson from 95.226.88.13 port 36877
Jul 18 10:58:13 MK-Soft-VM3 sshd\[28803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.226.88.13
Jul 18 10:58:15 MK-Soft-VM3 sshd\[28803\]: Failed password for invalid user anderson from 95.226.88.13 port 36877 ssh2
...
2019-07-18 19:56:53
106.12.45.23 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 19:15:48
173.12.157.141 attackspam
Jul 18 13:30:48 s64-1 sshd[1453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.12.157.141
Jul 18 13:30:50 s64-1 sshd[1453]: Failed password for invalid user ubuntu from 173.12.157.141 port 60959 ssh2
Jul 18 13:38:14 s64-1 sshd[1980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.12.157.141
...
2019-07-18 19:46:48
92.119.160.146 attack
Port scan on 5 port(s): 250 1009 1011 1997 10034
2019-07-18 19:54:19
27.78.144.69 attack
Automatic report - Port Scan Attack
2019-07-18 19:18:33
103.94.3.210 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 02:12:12,888 INFO [shellcode_manager] (103.94.3.210) no match, writing hexdump (fd6198c3f90f806d315298d3af60e9b7 :2133515) - MS17010 (EternalBlue)
2019-07-18 19:49:13
222.252.105.68 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:42:51,610 INFO [amun_request_handler] PortScan Detected on Port: 445 (222.252.105.68)
2019-07-18 19:26:16
204.18.210.141 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 09:40:47,429 INFO [amun_request_handler] PortScan Detected on Port: 445 (204.18.210.141)
2019-07-18 20:01:03
101.28.28.103 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-18 19:52:54
213.185.163.124 attack
Jul 18 13:35:14 eventyay sshd[9034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.185.163.124
Jul 18 13:35:16 eventyay sshd[9034]: Failed password for invalid user lobby from 213.185.163.124 port 46784 ssh2
Jul 18 13:41:05 eventyay sshd[10637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.185.163.124
...
2019-07-18 19:50:25
112.85.42.237 attack
Jul 18 16:26:39 areeb-Workstation sshd\[30780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Jul 18 16:26:41 areeb-Workstation sshd\[30780\]: Failed password for root from 112.85.42.237 port 34906 ssh2
Jul 18 16:28:48 areeb-Workstation sshd\[31286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-07-18 19:29:43
185.165.169.160 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-07-18 20:03:12
80.249.176.102 attackbotsspam
SSH Bruteforce @ SigaVPN honeypot
2019-07-18 19:21:20

Recently Reported IPs

142.43.72.168 6.118.35.163 223.157.4.135 163.96.122.121
171.134.62.222 112.16.63.216 236.155.210.176 157.198.147.185
17.183.196.168 229.24.168.133 73.95.130.252 152.162.2.98
225.112.145.50 144.76.87.187 170.59.225.251 161.12.111.74
230.5.199.43 33.3.208.35 97.35.31.82 247.14.74.217