Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rio de Janeiro

Region: Rio de Janeiro

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.196.118.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.196.118.34.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092401 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 25 02:31:10 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 34.118.196.168.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.118.196.168.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.0.61.26 attackbots
1583831929 - 03/10/2020 10:18:49 Host: 84.0.61.26/84.0.61.26 Port: 445 TCP Blocked
2020-03-11 00:54:14
185.144.60.49 attackspambots
firewall-block, port(s): 34567/tcp
2020-03-11 01:18:23
167.172.117.159 attack
167.172.117.159 - - [10/Mar/2020:10:55:14 +0100] "GET /wp-login.php HTTP/1.1" 404 17793 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-11 00:47:48
110.77.135.148 attack
Mar 10 09:18:17 ws26vmsma01 sshd[73582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.77.135.148
Mar 10 09:18:19 ws26vmsma01 sshd[73582]: Failed password for invalid user postgres from 110.77.135.148 port 38830 ssh2
...
2020-03-11 01:09:35
169.45.175.4 attackbotsspam
SSH login attempts.
2020-03-11 00:49:22
201.47.159.138 attackbots
Mar 10 13:43:30 firewall sshd[12719]: Invalid user zhongyan from 201.47.159.138
Mar 10 13:43:31 firewall sshd[12719]: Failed password for invalid user zhongyan from 201.47.159.138 port 46110 ssh2
Mar 10 13:53:10 firewall sshd[12965]: Invalid user zhaohongyu from 201.47.159.138
...
2020-03-11 01:04:03
222.170.170.196 attackbots
Port 587 scan denied
2020-03-11 01:15:34
103.19.99.20 attackbots
1583831906 - 03/10/2020 10:18:26 Host: 103.19.99.20/103.19.99.20 Port: 445 TCP Blocked
2020-03-11 01:04:27
222.186.30.209 attackspambots
$f2bV_matches
2020-03-11 00:44:31
94.180.106.76 attackspambots
Automatic report - Port Scan Attack
2020-03-11 00:49:53
188.76.48.121 attack
Mar 10 16:10:46 ns382633 sshd\[10038\]: Invalid user pi from 188.76.48.121 port 16059
Mar 10 16:10:46 ns382633 sshd\[10038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.76.48.121
Mar 10 16:10:46 ns382633 sshd\[10040\]: Invalid user pi from 188.76.48.121 port 16060
Mar 10 16:10:46 ns382633 sshd\[10040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.76.48.121
Mar 10 16:10:48 ns382633 sshd\[10038\]: Failed password for invalid user pi from 188.76.48.121 port 16059 ssh2
Mar 10 16:10:49 ns382633 sshd\[10040\]: Failed password for invalid user pi from 188.76.48.121 port 16060 ssh2
2020-03-11 01:20:10
124.156.105.251 attack
Mar 10 16:01:47 ns382633 sshd\[8286\]: Invalid user ics from 124.156.105.251 port 46364
Mar 10 16:01:47 ns382633 sshd\[8286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.105.251
Mar 10 16:01:49 ns382633 sshd\[8286\]: Failed password for invalid user ics from 124.156.105.251 port 46364 ssh2
Mar 10 16:23:52 ns382633 sshd\[12062\]: Invalid user es from 124.156.105.251 port 46724
Mar 10 16:23:52 ns382633 sshd\[12062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.105.251
2020-03-11 00:42:42
188.254.0.2 attackspam
suspicious action Tue, 10 Mar 2020 12:12:16 -0300
2020-03-11 01:00:18
42.236.91.186 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-03-11 01:30:05
159.192.143.129 attack
" "
2020-03-11 01:25:27

Recently Reported IPs

207.110.17.212 166.248.234.128 153.210.210.108 218.5.126.106
230.70.71.5 124.156.208.90 250.21.62.126 205.168.204.192
210.135.244.145 172.25.134.37 248.73.152.73 94.23.255.52
58.223.32.101 133.15.102.210 211.228.195.103 104.182.171.58
166.76.24.233 172.40.199.63 124.212.178.240 26.54.129.245