Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.45.214.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7338
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.45.214.172.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:24:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 172.214.45.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.214.45.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.236.38.105 attackbots
Jan 22 01:05:10 ovpn sshd\[21974\]: Invalid user harry from 104.236.38.105
Jan 22 01:05:10 ovpn sshd\[21974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
Jan 22 01:05:11 ovpn sshd\[21974\]: Failed password for invalid user harry from 104.236.38.105 port 39922 ssh2
Jan 22 01:10:44 ovpn sshd\[23396\]: Invalid user fwinter from 104.236.38.105
Jan 22 01:10:44 ovpn sshd\[23396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.38.105
2020-01-22 08:38:18
104.239.141.155 attackspam
Unauthorized connection attempt detected from IP address 104.239.141.155 to port 23 [J]
2020-01-22 08:37:58
182.242.107.84 attackbots
Unauthorized connection attempt detected from IP address 182.242.107.84 to port 8118 [J]
2020-01-22 08:28:10
198.1.65.159 attack
SSH Login Bruteforce
2020-01-22 08:50:15
123.158.60.28 attackspam
Unauthorized connection attempt detected from IP address 123.158.60.28 to port 8123 [J]
2020-01-22 08:33:52
202.74.236.9 attackspambots
Unauthorized connection attempt detected from IP address 202.74.236.9 to port 8080 [J]
2020-01-22 08:49:59
142.54.77.146 attackbots
Unauthorized connection attempt detected from IP address 142.54.77.146 to port 9000 [J]
2020-01-22 08:31:43
218.21.171.51 attackbotsspam
Unauthorized connection attempt detected from IP address 218.21.171.51 to port 23 [J]
2020-01-22 08:49:36
114.67.80.39 attackspambots
Unauthorized connection attempt detected from IP address 114.67.80.39 to port 2220 [J]
2020-01-22 08:35:10
175.184.164.249 attackbotsspam
Unauthorized connection attempt detected from IP address 175.184.164.249 to port 8081 [J]
2020-01-22 08:53:34
123.163.114.25 attackbots
Unauthorized connection attempt detected from IP address 123.163.114.25 to port 8443 [J]
2020-01-22 08:33:21
220.77.101.151 attackbotsspam
Unauthorized connection attempt detected from IP address 220.77.101.151 to port 5555 [J]
2020-01-22 08:23:29
110.177.74.14 attackbots
Unauthorized connection attempt detected from IP address 110.177.74.14 to port 8118 [J]
2020-01-22 08:35:54
187.190.227.73 attackspambots
Unauthorized connection attempt detected from IP address 187.190.227.73 to port 22 [J]
2020-01-22 08:26:39
114.34.233.78 attackspambots
Unauthorized connection attempt detected from IP address 114.34.233.78 to port 4567 [J]
2020-01-22 08:57:20

Recently Reported IPs

115.59.94.98 118.45.214.197 118.45.214.199 118.45.228.249
118.45.221.1 118.45.214.75 118.45.153.73 118.45.214.163
118.45.89.227 118.46.210.55 118.46.226.142 115.60.138.79
118.45.99.127 118.46.33.131 118.45.246.106 118.46.40.208
118.47.140.206 118.47.130.160 118.46.74.213 118.47.140.157