Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: SingTel

Hostname: unknown

Organization: Singtel Fibre Broadband

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.200.208.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35595
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.200.208.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 04:21:25 CST 2019
;; MSG SIZE  rcvd: 118

Host info
53.208.200.118.in-addr.arpa domain name pointer bb118-200-208-53.singnet.com.sg.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
53.208.200.118.in-addr.arpa	name = bb118-200-208-53.singnet.com.sg.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
52.168.48.111 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-03 03:43:50
36.70.125.178 attackspam
1585831250 - 04/02/2020 14:40:50 Host: 36.70.125.178/36.70.125.178 Port: 445 TCP Blocked
2020-04-03 04:16:21
162.247.73.192 attack
(mod_security) mod_security (id:210492) triggered by 162.247.73.192 (US/United States/-): 5 in the last 3600 secs
2020-04-03 04:08:10
54.37.71.204 attack
Apr  2 20:32:05 haigwepa sshd[5567]: Failed password for root from 54.37.71.204 port 49932 ssh2
...
2020-04-03 03:58:15
129.126.243.173 attack
Apr  2 20:57:50 cloud sshd[15675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.126.243.173 
Apr  2 20:57:52 cloud sshd[15675]: Failed password for invalid user liuxin from 129.126.243.173 port 53888 ssh2
2020-04-03 03:49:03
139.199.20.202 attackspam
Invalid user jl from 139.199.20.202 port 60256
2020-04-03 04:04:06
117.239.37.226 attack
Unauthorised access (Apr  2) SRC=117.239.37.226 LEN=52 TTL=111 ID=6669 DF TCP DPT=1433 WINDOW=8192 SYN
2020-04-03 03:40:06
51.38.121.207 attack
$f2bV_matches
2020-04-03 03:59:32
59.17.151.230 attack
Automatic report - Port Scan Attack
2020-04-03 04:04:55
178.62.75.60 attackspambots
Invalid user test from 178.62.75.60 port 47460
2020-04-03 04:13:48
24.142.36.105 attack
Apr  2 19:57:27 [HOSTNAME] sshd[24304]: User **removed** from 24.142.36.105 not allowed because not listed in AllowUsers
Apr  2 19:57:27 [HOSTNAME] sshd[24304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.142.36.105  user=**removed**
Apr  2 19:57:29 [HOSTNAME] sshd[24304]: Failed password for invalid user **removed** from 24.142.36.105 port 39688 ssh2
...
2020-04-03 03:45:42
168.232.131.143 attackspambots
Lines containing failures of 168.232.131.143
Apr  2 14:32:18 shared02 sshd[13921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.131.143  user=r.r
Apr  2 14:32:20 shared02 sshd[13921]: Failed password for r.r from 168.232.131.143 port 51099 ssh2
Apr  2 14:32:23 shared02 sshd[13921]: Failed password for r.r from 168.232.131.143 port 51099 ssh2
Apr  2 14:32:24 shared02 sshd[13921]: Failed password for r.r from 168.232.131.143 port 51099 ssh2
Apr  2 14:32:26 shared02 sshd[13921]: Failed password for r.r from 168.232.131.143 port 51099 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.232.131.143
2020-04-03 03:54:06
116.232.34.219 attackspam
Apr  2 23:32:14 our-server-hostname postfix/smtpd[15144]: connect from unknown[116.232.34.219]
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x
Apr x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.232.34.219
2020-04-03 04:01:29
92.222.141.74 attack
scan z
2020-04-03 03:57:10
88.98.232.53 attackbots
Apr  2 21:46:19 [host] sshd[4550]: Invalid user 12
Apr  2 21:46:19 [host] sshd[4550]: pam_unix(sshd:a
Apr  2 21:46:21 [host] sshd[4550]: Failed password
2020-04-03 03:56:32

Recently Reported IPs

175.249.234.229 185.95.211.167 36.231.217.83 108.76.192.2
8.37.46.149 142.190.214.147 84.42.17.128 179.167.229.11
191.2.78.157 99.206.206.169 106.22.223.67 216.240.148.3
70.98.143.11 121.88.250.219 132.59.247.143 112.12.157.116
219.36.85.108 82.233.159.209 200.48.132.167 17.122.221.21