Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phuket

Region: Phuket

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '118.173.145.0 - 118.173.145.255'

% Abuse contact for '118.173.145.0 - 118.173.145.255' is 'abuse@totisp.net'

inetnum:        118.173.145.0 - 118.173.145.255
netname:        totnet
descr:          TOT Public Company Limited Bangkok
country:        th
tech-c:         tk56-ap
admin-c:        pa82-ap
status:         assigned non-portable
mnt-by:         maint-th-tot
last-modified:  2008-09-04T07:19:35Z
source:         APNIC

person:         Pansak Arpakajorn
nic-hdl:        PA82-AP
e-mail:         abuse@totisp.net
address:        TOT Public Company Limited
address:        89/2 Moo 3 Chaengwattana Rd, Laksi,Bangkok 10210 THAILAND
phone:          +66-2574-9178
fax-no:         +66-2574-8401
country:        TH
mnt-by:         MAINT-TH-TOT
last-modified:  2010-05-07T07:54:11Z
source:         APNIC

person:         tawat kerdput
nic-hdl:        TK56-AP
e-mail:         abuse@totisp.net
address:        TOT Public Company Limited
address:        89/2 Moo 3 Chaengwattana Rd, Laksi, Bangkok 10210 THAILAND
phone:          +66-2505-6117
fax-no:         +66-2574-8401
country:        TH
mnt-by:         MAINT-TH-TOT
last-modified:  2010-05-07T08:01:24Z
source:         APNIC

% Information related to '118.173.144.0/20AS23969'

route:          118.173.144.0/20
origin:         AS23969
descr:          TOT Public Company Limited
                National Telecom Public Company Limited
                Chaengwattana Office
                89/2 Chaengwatthana Road
                Thoongsonghong
mnt-by:         MAINT-TH-TOT
last-modified:  2025-12-09T07:03:57Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.173.145.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.173.145.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 07:07:22 CST 2026
;; MSG SIZE  rcvd: 107
Host info
27.145.173.118.in-addr.arpa domain name pointer node-snv.pool-118-173.dynamic.nt-isp.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.145.173.118.in-addr.arpa	name = node-snv.pool-118-173.dynamic.nt-isp.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.57.160.131 attackbots
Feb 19 19:21:47 XXXXXX sshd[12319]: Invalid user shinken from 202.57.160.131 port 34796
2020-02-20 04:22:47
92.118.161.37 attackbotsspam
8333/tcp 5906/tcp 995/tcp...
[2019-12-21/2020-02-19]52pkt,37pt.(tcp),5pt.(udp)
2020-02-20 04:53:17
190.94.211.58 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 04:41:09
170.245.224.19 attackspam
1582138788 - 02/19/2020 19:59:48 Host: 170.245.224.19/170.245.224.19 Port: 445 TCP Blocked
2020-02-20 04:28:55
188.162.40.129 attackbots
Unauthorized connection attempt from IP address 188.162.40.129 on Port 445(SMB)
2020-02-20 04:39:14
107.161.16.141 attack
Lines containing failures of 107.161.16.141 (max 1000)
Feb 19 17:00:43 localhost sshd[28899]: Invalid user ftp from 107.161.16.141 port 50237
Feb 19 17:00:43 localhost sshd[28899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.16.141 
Feb 19 17:00:45 localhost sshd[28899]: Failed password for invalid user ftp from 107.161.16.141 port 50237 ssh2
Feb 19 17:00:45 localhost sshd[28899]: Received disconnect from 107.161.16.141 port 50237:11: Bye Bye [preauth]
Feb 19 17:00:45 localhost sshd[28899]: Disconnected from invalid user ftp 107.161.16.141 port 50237 [preauth]
Feb 19 17:11:56 localhost sshd[31253]: Invalid user pai from 107.161.16.141 port 53642
Feb 19 17:11:56 localhost sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.16.141 
Feb 19 17:11:58 localhost sshd[31253]: Failed password for invalid user pai from 107.161.16.141 port 53642 ssh2
Feb 19 17:11:58 localhos........
------------------------------
2020-02-20 04:47:19
162.217.224.233 attack
tcp 2323
2020-02-20 04:23:30
176.152.47.6 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-02-20 04:35:49
90.154.125.161 attackspam
Honeypot attack, port: 81, PTR: ipoe-static.mosoblast.rt.ru.
2020-02-20 04:54:40
114.33.208.170 attackbotsspam
Honeypot attack, port: 81, PTR: 114-33-208-170.HINET-IP.hinet.net.
2020-02-20 04:45:57
186.96.65.226 attackspambots
Unauthorized connection attempt from IP address 186.96.65.226 on Port 445(SMB)
2020-02-20 04:33:21
36.79.254.223 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 04:40:54
185.176.27.246 attack
02/19/2020-21:54:23.791285 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-20 04:55:09
117.193.11.10 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 04:34:47
49.146.43.67 attackbots
Honeypot attack, port: 445, PTR: dsl.49.146.43.67.pldt.net.
2020-02-20 04:32:58

Recently Reported IPs

2606:4700:10::6814:6831 39.144.94.234 54.158.210.232 110.77.187.117
2606:4700:10::6814:8065 2606:4700:10::6816:4547 2606:4700:10::6816:559 2606:4700:10::6814:5068
110.78.150.177 2606:4700:10::6816:4372 160.119.76.55 2606:4700:10::ac43:2846
2606:4700:10::6816:1475 2606:4700:10::6814:7347 2606:4700:10::6814:4631 2606:4700:10::6816:1958
2606:4700:10::6816:1171 2606:4700:10::6814:8359 2606:4700:10::6814:5476 2606:4700:10::6814:9548