Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: The Internet Group (IHUG) Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
23/tcp
[2019-09-01]1pkt
2019-09-01 17:09:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.93.96.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41703
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.93.96.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 17:09:32 CST 2019
;; MSG SIZE  rcvd: 117
Host info
214.96.93.118.in-addr.arpa domain name pointer 118-93-96-214.dsl.dyn.ihug.co.nz.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
214.96.93.118.in-addr.arpa	name = 118-93-96-214.dsl.dyn.ihug.co.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.138.128 attack
" "
2020-05-30 07:16:23
118.40.228.44 attack
Automatic report - Banned IP Access
2020-05-30 07:18:17
167.172.238.159 attackspambots
May 30 00:21:54 vps639187 sshd\[12257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159  user=root
May 30 00:21:56 vps639187 sshd\[12257\]: Failed password for root from 167.172.238.159 port 57354 ssh2
May 30 00:26:29 vps639187 sshd\[12360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159  user=root
...
2020-05-30 07:01:50
220.142.128.10 attackspam
Port Scan detected!
...
2020-05-30 07:13:50
114.35.251.127 attackspambots
Hits on port : 2323
2020-05-30 06:53:56
104.160.34.166 attackbotsspam
Invalid user sftptest from 104.160.34.166 port 58402
2020-05-30 07:10:26
139.59.2.184 attack
Invalid user link from 139.59.2.184 port 49412
2020-05-30 07:20:08
101.89.197.232 attack
Invalid user nelu from 101.89.197.232 port 39808
2020-05-30 06:56:23
200.87.48.171 attackspam
May 29 23:46:31 piServer sshd[13996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.48.171 
May 29 23:46:33 piServer sshd[13996]: Failed password for invalid user frederick from 200.87.48.171 port 56388 ssh2
May 29 23:51:08 piServer sshd[14500]: Failed password for root from 200.87.48.171 port 46313 ssh2
...
2020-05-30 06:57:12
185.186.240.2 attack
2020-05-30T00:59:44.146459sd-86998 sshd[24150]: Invalid user hari from 185.186.240.2 port 38038
2020-05-30T00:59:44.150538sd-86998 sshd[24150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.240.2
2020-05-30T00:59:44.146459sd-86998 sshd[24150]: Invalid user hari from 185.186.240.2 port 38038
2020-05-30T00:59:46.658512sd-86998 sshd[24150]: Failed password for invalid user hari from 185.186.240.2 port 38038 ssh2
2020-05-30T01:03:12.388167sd-86998 sshd[24636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.240.2  user=root
2020-05-30T01:03:14.785418sd-86998 sshd[24636]: Failed password for root from 185.186.240.2 port 33562 ssh2
...
2020-05-30 07:10:07
192.95.42.46 attackbots
ENG,DEF GET /w00tw00t.at.ISC.SANS.DFind:)
2020-05-30 07:00:07
59.127.162.229 attackspam
Port Scan detected!
...
2020-05-30 06:56:39
103.132.228.224 attack
Automatic report - Port Scan Attack
2020-05-30 06:55:40
162.243.137.118 attackspambots
2020-05-30 07:12:25
49.88.112.112 attack
May 29 19:08:32 plusreed sshd[7284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
May 29 19:08:34 plusreed sshd[7284]: Failed password for root from 49.88.112.112 port 24143 ssh2
...
2020-05-30 07:23:39

Recently Reported IPs

115.74.194.148 114.236.6.35 49.71.125.236 114.108.177.68
55.203.32.207 177.150.59.220 114.47.124.123 60.100.6.16
118.78.54.197 128.149.110.96 143.197.81.37 114.38.44.208
185.29.124.174 14.206.57.149 157.110.105.12 113.190.123.142
113.183.134.227 113.181.159.131 113.174.108.179 192.38.146.148