Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.21.48.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.21.48.157.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012502 1800 900 604800 86400

;; Query time: 172 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 09:25:58 CST 2020
;; MSG SIZE  rcvd: 117
Host info
157.48.21.118.in-addr.arpa domain name pointer i118-21-48-157.s41.a003.ap.plala.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.48.21.118.in-addr.arpa	name = i118-21-48-157.s41.a003.ap.plala.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.108.22 attack
Jul 19 06:04:40 vps647732 sshd[32481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.108.22
Jul 19 06:04:42 vps647732 sshd[32481]: Failed password for invalid user reddy from 178.128.108.22 port 41598 ssh2
...
2019-07-19 12:22:49
45.40.134.20 attack
xmlrpc attack
2019-07-19 12:26:42
113.160.37.26 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 19:22:35,891 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.160.37.26)
2019-07-19 12:23:52
163.172.43.53 attack
Feb 23 18:05:25 vpn sshd[27353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.43.53
Feb 23 18:05:27 vpn sshd[27353]: Failed password for invalid user ftpuser from 163.172.43.53 port 42710 ssh2
Feb 23 18:09:15 vpn sshd[27373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.43.53
2019-07-19 12:42:06
163.44.207.232 attackspambots
Jan  1 13:51:59 vpn sshd[13908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.207.232
Jan  1 13:52:01 vpn sshd[13908]: Failed password for invalid user alpha from 163.44.207.232 port 55654 ssh2
Jan  1 13:56:58 vpn sshd[13915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.207.232
2019-07-19 12:19:58
182.85.163.43 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-18 19:23:57,809 INFO [amun_request_handler] PortScan Detected on Port: 445 (182.85.163.43)
2019-07-19 11:57:23
159.226.169.53 attackspam
Jul 19 01:12:21 mail sshd\[18820\]: Invalid user passwd from 159.226.169.53 port 33355
Jul 19 01:12:21 mail sshd\[18820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.169.53
Jul 19 01:12:23 mail sshd\[18820\]: Failed password for invalid user passwd from 159.226.169.53 port 33355 ssh2
Jul 19 01:16:12 mail sshd\[19460\]: Invalid user Chris123 from 159.226.169.53 port 50208
Jul 19 01:16:12 mail sshd\[19460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.169.53
2019-07-19 12:17:10
164.132.42.32 attack
Feb 27 17:56:41 vpn sshd[840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32
Feb 27 17:56:43 vpn sshd[840]: Failed password for invalid user jy from 164.132.42.32 port 53950 ssh2
Feb 27 18:02:26 vpn sshd[879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.42.32
2019-07-19 11:52:01
164.132.220.158 attack
Nov 28 20:36:35 vpn sshd[18885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.220.158
Nov 28 20:36:37 vpn sshd[18885]: Failed password for invalid user annulee from 164.132.220.158 port 57404 ssh2
Nov 28 20:39:17 vpn sshd[18890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.220.158
2019-07-19 11:59:07
190.211.141.217 attackbotsspam
Jul 19 03:21:59 MK-Soft-VM3 sshd\[5654\]: Invalid user developer from 190.211.141.217 port 32269
Jul 19 03:21:59 MK-Soft-VM3 sshd\[5654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217
Jul 19 03:22:02 MK-Soft-VM3 sshd\[5654\]: Failed password for invalid user developer from 190.211.141.217 port 32269 ssh2
...
2019-07-19 11:59:47
115.236.61.202 attack
Port scan
2019-07-19 11:52:41
122.97.128.130 attackbotsspam
DATE:2019-07-18 23:02:39, IP:122.97.128.130, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-07-19 11:55:32
51.38.126.92 attackspambots
Jul 19 05:52:26 herz-der-gamer sshd[28986]: Failed password for invalid user admin from 51.38.126.92 port 35314 ssh2
...
2019-07-19 12:34:27
164.132.58.90 attackspambots
May  5 05:49:20 vpn sshd[19114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.58.90  user=root
May  5 05:49:22 vpn sshd[19114]: Failed password for root from 164.132.58.90 port 42922 ssh2
May  5 05:51:05 vpn sshd[19117]: Invalid user delta from 164.132.58.90
May  5 05:51:05 vpn sshd[19117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.58.90
May  5 05:51:06 vpn sshd[19117]: Failed password for invalid user delta from 164.132.58.90 port 50606 ssh2
2019-07-19 11:45:07
163.172.28.192 attack
Mar  7 05:33:49 vpn sshd[29650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.28.192
Mar  7 05:33:52 vpn sshd[29650]: Failed password for invalid user viruser from 163.172.28.192 port 48480 ssh2
Mar  7 05:40:11 vpn sshd[29677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.28.192
2019-07-19 12:44:35

Recently Reported IPs

125.118.44.192 22.251.88.102 114.15.116.172 83.215.74.88
220.179.214.156 187.188.193.31 183.128.240.127 183.92.247.135
183.81.106.202 182.108.168.118 182.105.200.74 182.105.15.109
182.92.81.28 180.123.33.180 180.119.156.165 180.118.69.163
79.151.34.11 145.239.35.39 144.0.88.66 140.255.61.49