Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.193.34.233 attack
May 14 00:47:47 vps639187 sshd\[416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233  user=root
May 14 00:47:49 vps639187 sshd\[416\]: Failed password for root from 118.193.34.233 port 53764 ssh2
May 14 00:52:30 vps639187 sshd\[506\]: Invalid user nathan from 118.193.34.233 port 46694
May 14 00:52:30 vps639187 sshd\[506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233
...
2020-05-14 08:13:10
118.193.34.233 attackbots
May 12 02:04:07 web1 sshd\[26746\]: Invalid user prueba from 118.193.34.233
May 12 02:04:07 web1 sshd\[26746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233
May 12 02:04:09 web1 sshd\[26746\]: Failed password for invalid user prueba from 118.193.34.233 port 49516 ssh2
May 12 02:10:37 web1 sshd\[27429\]: Invalid user ec2-user from 118.193.34.233
May 12 02:10:37 web1 sshd\[27429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.193.34.233
2020-05-12 20:45:14
118.193.34.233 attackspam
SSH Invalid Login
2020-05-09 12:49:31
118.193.34.233 attack
$f2bV_matches
2020-05-03 12:39:52
118.193.34.233 attackspambots
SSH Brute-Force. Ports scanning.
2020-04-27 22:10:46
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '118.193.34.0 - 118.193.34.255'

% Abuse contact for '118.193.34.0 - 118.193.34.255' is 'hegui@ucloud.cn'

inetnum:        118.193.34.0 - 118.193.34.255
netname:        UCLOUD-HK
descr:          UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
country:        HK
admin-c:        UITH2-AP
tech-c:         UITH2-AP
abuse-c:        AU164-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-UCLOUD-HK
mnt-irt:        IRT-UCLOUD-HK
last-modified:  2024-08-26T12:43:42Z
source:         APNIC

irt:            IRT-UCLOUD-HK
address:        FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
e-mail:         pn-wan@ucloud.cn
abuse-mailbox:  hegui@ucloud.cn
admin-c:        UITH2-AP
tech-c:         UITH2-AP
auth:           # Filtered
remarks:        pn-wan@ucloud.cn was validated on 2026-02-27
remarks:        hegui@ucloud.cn was validated on 2026-02-27
mnt-by:         MAINT-UCLOUD-HK
last-modified:  2026-02-27T02:07:48Z
source:         APNIC

role:           ABUSE UCLOUDHK
country:        ZZ
address:        FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
phone:          +000000000
e-mail:         pn-wan@ucloud.cn
admin-c:        UITH2-AP
tech-c:         UITH2-AP
nic-hdl:        AU164-AP
remarks:        Generated from irt object IRT-UCLOUD-HK
remarks:        pn-wan@ucloud.cn was validated on 2026-02-27
remarks:        hegui@ucloud.cn was validated on 2026-02-27
abuse-mailbox:  hegui@ucloud.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-27T02:08:22Z
source:         APNIC

role:           UCLOUD INFORMATION TECHNOLOGY HK LIMITED
address:        FLAT/RM 603 6/F, LAWS COMMERCIAL PLAZA, 788 CHEUNG SHA WAN ROAD, KL,, Hong Kong
country:        HK
phone:          +000000000
e-mail:         u-ipnic@ucloud.cn
admin-c:        UITH2-AP
tech-c:         UITH2-AP
nic-hdl:        UITH2-AP
notify:         hegui@ucloud.cn
mnt-by:         MAINT-UCLOUD-HK
last-modified:  2022-05-16T03:54:14Z
source:         APNIC

% Information related to '118.193.34.0/24AS135377'

route:          118.193.34.0/24
origin:         AS135377
descr:          UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
                FLAT/RM 603 6/F
                LAWS COMMERCIAL PLAZA
                788 CHEUNG SHA WAN ROAD, KL,
mnt-by:         MAINT-UCLOUD-HK
last-modified:  2020-11-26T07:25:43Z
source:         APNIC

% Information related to '118.193.34.0/24AS62610'

route:          118.193.34.0/24
origin:         AS62610
descr:          UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED
                FLAT/RM 603 6/F
                LAWS COMMERCIAL PLAZA
                788 CHEUNG SHA WAN ROAD, KL,
mnt-by:         MAINT-UCLOUD-HK
last-modified:  2025-07-27T09:58:51Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.193.34.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.193.34.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031900 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 16:37:34 CST 2026
;; MSG SIZE  rcvd: 106
Host info
19.34.193.118.in-addr.arpa domain name pointer zmvkscw.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.34.193.118.in-addr.arpa	name = zmvkscw.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
172.58.121.242 attackbotsspam
Chat Spam
2019-07-15 18:34:37
137.59.162.169 attack
Jul 15 09:39:20 lnxmysql61 sshd[24210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
Jul 15 09:39:22 lnxmysql61 sshd[24210]: Failed password for invalid user web from 137.59.162.169 port 58873 ssh2
Jul 15 09:49:01 lnxmysql61 sshd[25256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
2019-07-15 18:31:55
115.124.64.126 attackbots
Jul 15 10:04:15 meumeu sshd[11309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.124.64.126 
Jul 15 10:04:18 meumeu sshd[11309]: Failed password for invalid user finn from 115.124.64.126 port 46536 ssh2
Jul 15 10:10:10 meumeu sshd[12444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.124.64.126 
...
2019-07-15 17:55:41
24.90.187.93 attackspambots
Automatic report - Port Scan Attack
2019-07-15 17:39:15
132.232.40.86 attack
Jul 15 00:26:07 home sshd[13157]: Invalid user router from 132.232.40.86 port 34034
Jul 15 00:26:07 home sshd[13157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86
Jul 15 00:26:07 home sshd[13157]: Invalid user router from 132.232.40.86 port 34034
Jul 15 00:26:10 home sshd[13157]: Failed password for invalid user router from 132.232.40.86 port 34034 ssh2
Jul 15 00:36:59 home sshd[13187]: Invalid user vnc from 132.232.40.86 port 45792
Jul 15 00:36:59 home sshd[13187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86
Jul 15 00:36:59 home sshd[13187]: Invalid user vnc from 132.232.40.86 port 45792
Jul 15 00:37:01 home sshd[13187]: Failed password for invalid user vnc from 132.232.40.86 port 45792 ssh2
Jul 15 00:43:06 home sshd[13199]: Invalid user single from 132.232.40.86 port 42250
Jul 15 00:43:06 home sshd[13199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1
2019-07-15 18:26:17
178.46.214.227 attack
" "
2019-07-15 18:24:38
185.222.211.114 attackspam
Jul 15 06:16:48 box kernel: [1278833.603132] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.222.211.114 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=63291 PROTO=TCP SPT=41487 DPT=3352 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 15 06:26:02 box kernel: [1279386.754503] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.222.211.114 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53879 PROTO=TCP SPT=41487 DPT=3315 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 15 06:56:32 box kernel: [1281217.586988] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.222.211.114 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=9248 PROTO=TCP SPT=41487 DPT=3320 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 15 09:43:11 box kernel: [1291216.134170] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.222.211.114 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=49027 PROTO=TCP SPT=41487 DPT=3345 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 15 10:55:59 box kernel: [1295584.659609] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=185.222.211.114 DST=[munged] LEN=40 TOS=0x00 PREC=0x0
2019-07-15 18:17:04
94.191.15.73 attackbotsspam
15.07.2019 06:24:20 SSH access blocked by firewall
2019-07-15 18:31:36
68.183.83.166 attack
Jul 15 04:30:42 123flo sshd[24447]: Invalid user fake from 68.183.83.166
Jul 15 04:30:42 123flo sshd[24447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.166 
Jul 15 04:30:42 123flo sshd[24447]: Invalid user fake from 68.183.83.166
Jul 15 04:30:43 123flo sshd[24447]: Failed password for invalid user fake from 68.183.83.166 port 57572 ssh2
Jul 15 04:30:44 123flo sshd[24449]: Invalid user user from 68.183.83.166
2019-07-15 18:19:19
41.239.231.36 attack
Jul 15 09:25:19 srv-4 sshd\[17376\]: Invalid user admin from 41.239.231.36
Jul 15 09:25:19 srv-4 sshd\[17376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.239.231.36
Jul 15 09:25:21 srv-4 sshd\[17376\]: Failed password for invalid user admin from 41.239.231.36 port 52038 ssh2
...
2019-07-15 17:42:39
80.15.190.203 attackspambots
Automatic report - Banned IP Access
2019-07-15 17:34:41
167.86.111.59 attack
Automatic report - Port Scan Attack
2019-07-15 18:01:14
96.92.57.113 attackbotsspam
Automatic report - Port Scan Attack
2019-07-15 18:09:37
206.189.190.32 attackbotsspam
Jul 15 07:26:19 ip-172-31-1-72 sshd\[14769\]: Invalid user revista from 206.189.190.32
Jul 15 07:26:19 ip-172-31-1-72 sshd\[14769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32
Jul 15 07:26:21 ip-172-31-1-72 sshd\[14769\]: Failed password for invalid user revista from 206.189.190.32 port 50374 ssh2
Jul 15 07:30:46 ip-172-31-1-72 sshd\[14860\]: Invalid user jenkins from 206.189.190.32
Jul 15 07:30:46 ip-172-31-1-72 sshd\[14860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.190.32
2019-07-15 18:19:45
137.63.184.100 attackspam
Jul 15 10:07:25 dev sshd\[13950\]: Invalid user ems from 137.63.184.100 port 41582
Jul 15 10:07:25 dev sshd\[13950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100
...
2019-07-15 18:07:34

Recently Reported IPs

39.98.52.51 125.42.98.99 167.32.99.172 45.82.233.102
221.199.159.173 2606:4700:10::6816:713 2606:4700:10::6814:6396 2606:4700:10::6814:4795
121.237.149.153 121.237.149.197 2606:4700:10::6816:4367 2606:4700:10::6814:8450
134.35.157.82 122.192.203.57 2606:4700:10::6816:2206 2606:4700:10::6816:1434
2606:4700:10::6816:2479 10.101.34.234 10.101.34.13 60.188.9.143