Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongnam-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.55.28.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36334
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.55.28.69.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 05:55:51 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 69.28.55.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 69.28.55.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.32.219.209 attack
Jul 29 17:31:51 game-panel sshd[18555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.219.209
Jul 29 17:31:53 game-panel sshd[18555]: Failed password for invalid user hangwei from 178.32.219.209 port 46660 ssh2
Jul 29 17:35:27 game-panel sshd[18689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.219.209
2020-07-30 01:45:38
1.164.53.146 attack
Port Scan detected!
...
2020-07-30 02:13:30
103.83.36.101 attack
103.83.36.101 - - [29/Jul/2020:13:08:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.83.36.101 - - [29/Jul/2020:13:08:32 +0100] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.83.36.101 - - [29/Jul/2020:13:08:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-30 01:53:05
93.47.149.16 attackspambots
Automatic report - Banned IP Access
2020-07-30 01:58:07
139.59.83.203 attackbotsspam
139.59.83.203 - - [29/Jul/2020:16:10:18 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.83.203 - - [29/Jul/2020:16:10:20 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.83.203 - - [29/Jul/2020:16:10:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-30 02:01:35
178.32.218.192 attack
2020-07-29T13:22:03.646030shield sshd\[13719\]: Invalid user mpcheng from 178.32.218.192 port 47169
2020-07-29T13:22:03.651844shield sshd\[13719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3303787.ovh.net
2020-07-29T13:22:04.940777shield sshd\[13719\]: Failed password for invalid user mpcheng from 178.32.218.192 port 47169 ssh2
2020-07-29T13:25:48.118053shield sshd\[14394\]: Invalid user rjh from 178.32.218.192 port 52443
2020-07-29T13:25:48.124983shield sshd\[14394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3303787.ovh.net
2020-07-30 01:56:45
89.22.180.208 attackbotsspam
Jul 29 19:11:23 ns392434 sshd[23063]: Invalid user yongqin from 89.22.180.208 port 46508
Jul 29 19:11:23 ns392434 sshd[23063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208
Jul 29 19:11:23 ns392434 sshd[23063]: Invalid user yongqin from 89.22.180.208 port 46508
Jul 29 19:11:25 ns392434 sshd[23063]: Failed password for invalid user yongqin from 89.22.180.208 port 46508 ssh2
Jul 29 19:21:59 ns392434 sshd[23263]: Invalid user janfaust from 89.22.180.208 port 48040
Jul 29 19:21:59 ns392434 sshd[23263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.22.180.208
Jul 29 19:21:59 ns392434 sshd[23263]: Invalid user janfaust from 89.22.180.208 port 48040
Jul 29 19:22:01 ns392434 sshd[23263]: Failed password for invalid user janfaust from 89.22.180.208 port 48040 ssh2
Jul 29 19:26:02 ns392434 sshd[23293]: Invalid user nisuser2 from 89.22.180.208 port 59058
2020-07-30 02:09:49
49.234.56.65 attack
SSH Brute Force
2020-07-30 02:06:35
152.136.119.164 attack
Jul 29 20:34:13 ift sshd\[23879\]: Invalid user divyam from 152.136.119.164Jul 29 20:34:14 ift sshd\[23879\]: Failed password for invalid user divyam from 152.136.119.164 port 59036 ssh2Jul 29 20:37:05 ift sshd\[24420\]: Invalid user amrita from 152.136.119.164Jul 29 20:37:07 ift sshd\[24420\]: Failed password for invalid user amrita from 152.136.119.164 port 34012 ssh2Jul 29 20:40:02 ift sshd\[24841\]: Invalid user sujiafeng from 152.136.119.164
...
2020-07-30 01:48:26
13.68.171.41 attackspam
SSH brute-force attempt
2020-07-30 02:04:15
103.19.58.23 attackbots
Jul 29 19:46:12 ns381471 sshd[15541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.19.58.23
Jul 29 19:46:13 ns381471 sshd[15541]: Failed password for invalid user user12 from 103.19.58.23 port 59364 ssh2
2020-07-30 01:49:23
24.157.25.203 attackspam
Brute forcing email accounts
2020-07-30 01:44:22
27.64.18.196 attack
Automatic report - Port Scan Attack
2020-07-30 02:12:02
122.228.19.79 attack
122.228.19.79 was recorded 10 times by 4 hosts attempting to connect to the following ports: 444,1433,500,25565,110,8006,6000,1099,119. Incident counter (4h, 24h, all-time): 10, 96, 30775
2020-07-30 02:15:09
122.155.17.174 attack
Invalid user RCadmin from 122.155.17.174 port 16474
2020-07-30 01:45:02

Recently Reported IPs

185.194.239.171 205.162.158.203 79.135.234.46 213.162.54.8
120.142.237.3 41.37.219.183 102.230.152.153 196.49.98.217
150.200.19.253 187.35.145.152 193.140.164.51 190.90.99.5
144.160.152.208 170.17.191.64 58.176.93.42 67.31.146.199
104.160.10.250 167.71.49.116 120.35.189.184 223.27.16.120