Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.96.134.33 attack
Honeypot attack, port: 445, PTR: 33.static.118-96-134.astinet.telkom.net.id.
2020-02-01 23:25:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.96.134.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.96.134.150.			IN	A

;; AUTHORITY SECTION:
.			108	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:30:58 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 150.134.96.118.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 118.96.134.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.81.198.112 attack
[Mon Jul 06 10:47:31.357452 2020] [:error] [pid 8388:tid 140335205041920] [client 36.81.198.112:50748] [client 36.81.198.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/image-loader-worker-v3.js"] [unique_id "XwKe0w@SSZL6BNEesuZUwQABwwE"]
...
2020-07-06 19:56:31
86.124.39.244 attackbotsspam
 TCP (SYN) 86.124.39.244:55676 -> port 445, len 40
2020-07-06 20:25:39
140.143.9.142 attackbotsspam
Automatic report BANNED IP
2020-07-06 20:14:03
202.104.122.147 attackspam
frenzy
2020-07-06 20:16:15
41.44.124.228 attack
Attempted connection to port 445.
2020-07-06 20:32:05
118.27.9.23 attackbotsspam
Jul  6 06:56:18 web8 sshd\[1033\]: Invalid user jingxin from 118.27.9.23
Jul  6 06:56:18 web8 sshd\[1033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.9.23
Jul  6 06:56:20 web8 sshd\[1033\]: Failed password for invalid user jingxin from 118.27.9.23 port 37132 ssh2
Jul  6 06:57:52 web8 sshd\[1891\]: Invalid user admin from 118.27.9.23
Jul  6 06:57:52 web8 sshd\[1891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.9.23
2020-07-06 20:46:37
121.60.119.227 attackspambots
20 attempts against mh-ssh on bolt
2020-07-06 20:15:35
59.126.125.160 attack
Attempted connection to port 80.
2020-07-06 20:27:03
113.175.39.205 attackspam
1594007255 - 07/06/2020 05:47:35 Host: 113.175.39.205/113.175.39.205 Port: 445 TCP Blocked
2020-07-06 19:55:10
79.42.138.252 attackbotsspam
Unauthorized connection attempt detected from IP address 79.42.138.252 to port 5555
2020-07-06 20:26:04
141.98.10.199 attack
SSH Brute-Force reported by Fail2Ban
2020-07-06 20:10:23
201.209.138.16 attackspam
Attempted connection to port 445.
2020-07-06 20:33:52
171.224.181.224 attack
Unauthorized connection attempt from IP address 171.224.181.224 on Port 445(SMB)
2020-07-06 20:47:29
119.96.189.97 attack
detected by Fail2Ban
2020-07-06 20:12:31
54.38.180.93 attackspam
Jul  6 12:01:51 ajax sshd[30240]: Failed password for root from 54.38.180.93 port 40878 ssh2
2020-07-06 20:21:16

Recently Reported IPs

118.96.134.142 118.96.134.247 118.96.134.19 118.96.134.121
118.96.134.66 118.96.134.147 118.96.134.69 118.96.134.211
115.87.197.162 118.96.134.90 118.96.135.120 118.96.135.88
118.96.136.114 118.96.136.162 118.96.136.244 115.87.197.206
118.96.136.45 118.96.136.52 118.96.136.139 118.96.136.26