Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.212.105.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.212.105.20.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 07:58:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
20.105.212.118.in-addr.arpa domain name pointer 20.105.212.118.adsl-pool.jx.chinaunicom.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.105.212.118.in-addr.arpa	name = 20.105.212.118.adsl-pool.jx.chinaunicom.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.255.197.149 attackbotsspam
Honeypot attack, port: 445, PTR: 94-255-197-149.cust.bredband2.com.
2020-03-08 00:17:24
14.231.193.117 attackbotsspam
Brute-force attempt banned
2020-03-08 00:06:12
185.209.0.32 attackspam
03/07/2020-10:35:49.587937 185.209.0.32 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-08 00:09:52
171.94.32.21 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-07 23:51:44
92.50.45.244 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 00:30:49
35.226.165.144 attackspam
Mar  7 13:32:30 *** sshd[897]: User root from 35.226.165.144 not allowed because not listed in AllowUsers
2020-03-08 00:05:37
49.204.229.230 attackbots
Unauthorized connection attempt from IP address 49.204.229.230 on Port 445(SMB)
2020-03-08 00:10:50
106.12.199.74 attackspam
$f2bV_matches
2020-03-07 23:58:35
222.186.175.217 attackspam
Mar  7 14:54:21 server sshd[753011]: Failed password for root from 222.186.175.217 port 33776 ssh2
Mar  7 15:54:58 server sshd[762778]: Failed none for root from 222.186.175.217 port 10056 ssh2
Mar  7 15:55:00 server sshd[762778]: Failed password for root from 222.186.175.217 port 10056 ssh2
2020-03-08 00:33:14
5.196.65.135 attackbotsspam
Mar  7 06:17:49 hanapaa sshd\[24330\]: Invalid user lry from 5.196.65.135
Mar  7 06:17:49 hanapaa sshd\[24330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns334454.ip-5-196-65.eu
Mar  7 06:17:51 hanapaa sshd\[24330\]: Failed password for invalid user lry from 5.196.65.135 port 60554 ssh2
Mar  7 06:24:52 hanapaa sshd\[24862\]: Invalid user wpyan from 5.196.65.135
Mar  7 06:24:52 hanapaa sshd\[24862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns334454.ip-5-196-65.eu
2020-03-08 00:31:03
78.37.26.83 attack
suspicious action Sat, 07 Mar 2020 10:32:47 -0300
2020-03-07 23:52:20
183.89.152.205 attackspam
Brute-force attempt banned
2020-03-08 00:16:44
167.99.104.139 attackbots
20/3/7@08:32:22: FAIL: Alarm-Intrusion address from=167.99.104.139
...
2020-03-08 00:11:11
45.85.188.21 attackbots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-03-08 00:16:12
49.231.142.100 attackbots
Unauthorized connection attempt from IP address 49.231.142.100 on Port 445(SMB)
2020-03-08 00:13:07

Recently Reported IPs

118.212.105.198 118.212.105.200 184.149.61.46 118.212.105.202
118.212.105.204 118.212.105.206 118.212.105.208 118.212.105.212
118.212.105.214 118.212.105.217 118.212.105.218 118.212.105.22
118.212.105.221 118.212.105.222 118.212.105.225 23.85.4.153
118.212.105.226 118.212.105.229 118.212.105.230 118.212.105.232