Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.48.128.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.48.128.111.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:43:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 111.128.48.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.128.48.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.16.7.94 attackspam
port scan and connect, tcp 23 (telnet)
2019-07-31 17:49:00
222.170.168.106 attack
failed_logins
2019-07-31 16:44:59
107.170.249.243 attackbots
$f2bV_matches_ltvn
2019-07-31 17:34:03
104.248.57.21 attackspam
Apr 17 01:55:13 ubuntu sshd[395]: Failed password for invalid user nagios from 104.248.57.21 port 37154 ssh2
Apr 17 01:57:22 ubuntu sshd[736]: Failed password for daemon from 104.248.57.21 port 34788 ssh2
Apr 17 01:59:29 ubuntu sshd[776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21
2019-07-31 17:08:58
213.227.58.157 attack
Jul 31 10:18:56 debian sshd\[15434\]: Invalid user webadmin from 213.227.58.157 port 36156
Jul 31 10:18:56 debian sshd\[15434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.227.58.157
...
2019-07-31 17:37:34
82.60.209.242 attackbots
Jul 31 11:08:59 server sshd\[14565\]: Invalid user admin from 82.60.209.242 port 58992
Jul 31 11:08:59 server sshd\[14565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.60.209.242
Jul 31 11:09:01 server sshd\[14565\]: Failed password for invalid user admin from 82.60.209.242 port 58992 ssh2
Jul 31 11:10:05 server sshd\[19509\]: Invalid user ubuntu from 82.60.209.242 port 59572
Jul 31 11:10:05 server sshd\[19509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.60.209.242
2019-07-31 17:07:04
5.188.87.19 attack
firewall-block, port(s): 6636/tcp, 9506/tcp
2019-07-31 17:12:32
106.13.23.149 attackspam
firewall-block, port(s): 23/tcp
2019-07-31 16:50:59
177.154.234.179 attack
failed_logins
2019-07-31 17:48:07
197.52.239.141 attackspam
Jul 31 09:59:33 pl3server sshd[3920048]: reveeclipse mapping checking getaddrinfo for host-197.52.239.141.tedata.net [197.52.239.141] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 31 09:59:33 pl3server sshd[3920048]: Invalid user admin from 197.52.239.141
Jul 31 09:59:33 pl3server sshd[3920048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.52.239.141
Jul 31 09:59:35 pl3server sshd[3920048]: Failed password for invalid user admin from 197.52.239.141 port 43537 ssh2
Jul 31 09:59:36 pl3server sshd[3920048]: Connection closed by 197.52.239.141 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.52.239.141
2019-07-31 16:46:39
156.212.16.143 attackspam
Unauthorised access (Jul 31) SRC=156.212.16.143 LEN=60 TTL=53 ID=5050 DF TCP DPT=445 WINDOW=14600 SYN
2019-07-31 17:41:20
185.53.88.11 attackspambots
31.07.2019 08:10:23 Connection to port 5570 blocked by firewall
2019-07-31 16:50:36
121.142.111.98 attackbotsspam
SSH Brute Force
2019-07-31 17:38:43
220.83.161.249 attack
Feb 21 12:57:42 vtv3 sshd\[19776\]: Invalid user ftpuser from 220.83.161.249 port 60144
Feb 21 12:57:42 vtv3 sshd\[19776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.83.161.249
Feb 21 12:57:45 vtv3 sshd\[19776\]: Failed password for invalid user ftpuser from 220.83.161.249 port 60144 ssh2
Feb 21 13:04:34 vtv3 sshd\[21518\]: Invalid user user from 220.83.161.249 port 50188
Feb 21 13:04:34 vtv3 sshd\[21518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.83.161.249
Feb 24 02:34:43 vtv3 sshd\[11620\]: Invalid user nagios from 220.83.161.249 port 39108
Feb 24 02:34:43 vtv3 sshd\[11620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.83.161.249
Feb 24 02:34:45 vtv3 sshd\[11620\]: Failed password for invalid user nagios from 220.83.161.249 port 39108 ssh2
Feb 24 02:40:08 vtv3 sshd\[13874\]: Invalid user ubuntu from 220.83.161.249 port 45768
Feb 24 02:40:08 vtv3 sshd\
2019-07-31 16:54:51
101.116.31.249 attackspambots
Automatic report - Port Scan Attack
2019-07-31 17:13:23

Recently Reported IPs

161.81.157.124 87.203.251.23 241.200.101.225 225.55.91.155
154.150.194.220 43.16.136.19 52.161.112.25 18.167.76.228
249.133.230.23 38.34.124.59 185.160.246.146 76.172.3.111
96.196.157.218 91.162.169.239 6.183.224.152 54.250.135.154
174.188.16.9 58.132.78.178 149.25.59.160 172.250.123.169