Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.134.111.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.134.111.48.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:02:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 48.111.134.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.111.134.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.245.223 attack
2020-04-24T20:52:17.156428Z 088e5c6ac087 New connection: 80.211.245.223:35736 (172.17.0.5:2222) [session: 088e5c6ac087]
2020-04-24T20:57:23.232244Z 15324ed34cb0 New connection: 80.211.245.223:48150 (172.17.0.5:2222) [session: 15324ed34cb0]
2020-04-25 17:04:54
112.85.42.186 attackbots
Apr 25 10:59:50 vmd38886 sshd\[31705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Apr 25 10:59:53 vmd38886 sshd\[31705\]: Failed password for root from 112.85.42.186 port 39910 ssh2
Apr 25 10:59:54 vmd38886 sshd\[31705\]: Failed password for root from 112.85.42.186 port 39910 ssh2
2020-04-25 17:03:08
83.57.189.118 attack
Automatic report - Port Scan Attack
2020-04-25 16:59:31
222.186.173.238 attackbotsspam
Apr 25 10:52:47 * sshd[28072]: Failed password for root from 222.186.173.238 port 36902 ssh2
Apr 25 10:53:01 * sshd[28072]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 36902 ssh2 [preauth]
2020-04-25 17:08:25
149.202.48.58 attack
nginx-botsearch jail
2020-04-25 17:11:16
123.124.21.253 attackspam
Port probing on unauthorized port 1433
2020-04-25 16:43:10
109.174.115.198 attackbotsspam
RU - - [24/Apr/2020:19:21:52 +0300] POST /wp-login.php HTTP/1.1 200 4813 http://science-review.com/wp-login.php Mozilla/5.0 Windows NT 6.0; rv:34.0 Gecko/20100101 Firefox/34.0
2020-04-25 16:38:51
202.80.214.54 attackbotsspam
xmlrpc attack
2020-04-25 16:56:42
142.44.240.12 attack
12909/tcp
[2020-04-25]1pkt
2020-04-25 17:14:46
106.54.234.21 attackspambots
Apr 25 15:12:46 itv-usvr-02 sshd[17242]: Invalid user chimistry from 106.54.234.21 port 39976
Apr 25 15:12:46 itv-usvr-02 sshd[17242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.234.21
Apr 25 15:12:46 itv-usvr-02 sshd[17242]: Invalid user chimistry from 106.54.234.21 port 39976
Apr 25 15:12:48 itv-usvr-02 sshd[17242]: Failed password for invalid user chimistry from 106.54.234.21 port 39976 ssh2
Apr 25 15:13:17 itv-usvr-02 sshd[17246]: Invalid user don from 106.54.234.21 port 42224
2020-04-25 16:57:38
117.159.5.113 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-25 17:04:11
106.75.99.198 attack
Apr 25 15:34:40 itv-usvr-02 sshd[17951]: Invalid user ronjones from 106.75.99.198 port 31822
Apr 25 15:34:40 itv-usvr-02 sshd[17951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.99.198
Apr 25 15:34:40 itv-usvr-02 sshd[17951]: Invalid user ronjones from 106.75.99.198 port 31822
Apr 25 15:34:42 itv-usvr-02 sshd[17951]: Failed password for invalid user ronjones from 106.75.99.198 port 31822 ssh2
Apr 25 15:39:10 itv-usvr-02 sshd[18156]: Invalid user tom123 from 106.75.99.198 port 31401
2020-04-25 17:11:36
45.9.188.145 attackbotsspam
45.9.188.145 - - \[25/Apr/2020:11:51:45 +0800\] "GET /phpminiadmin.php HTTP/1.1" 404 30556 "-" "Python/3.8 aiohttp/3.6.2"
45.9.188.145 - - \[25/Apr/2020:11:51:45 +0800\] "GET /phpminiadmin.php HTTP/1.1" 404 29837 "-" "Python/3.8 aiohttp/3.6.2"
2020-04-25 17:22:06
190.114.65.151 attackbots
Apr 25 07:24:37 vps333114 sshd[28715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-114-65-151.sanluisctv.com.ar
Apr 25 07:24:39 vps333114 sshd[28715]: Failed password for invalid user qd from 190.114.65.151 port 41795 ssh2
...
2020-04-25 16:57:52
14.160.39.138 attack
Dovecot Invalid User Login Attempt.
2020-04-25 17:17:29

Recently Reported IPs

119.134.112.105 119.134.111.196 119.134.153.69 119.134.155.229
119.134.178.75 119.134.178.99 119.134.180.122 119.134.180.95
119.134.200.27 119.134.224.107 119.134.224.207 119.134.224.117
119.134.225.135 119.134.98.153 119.135.0.140 119.135.0.169
119.134.224.9 119.135.1.76 119.135.124.118 119.135.0.179