Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rome

Region: Regione Lazio

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '2.118.107.0 - 2.118.107.255'

% Abuse contact for '2.118.107.0 - 2.118.107.255' is 'abuse@business.telecomitalia.it'

inetnum:        2.118.107.0 - 2.118.107.255
netname:        INTERBUSINESS
remarks:        INFRA-AW
descr:          Telecom Italia SPA
descr:          Provider Local Registry
descr:          BB IBS
country:        IT
admin-c:        INAS1-RIPE
tech-c:         INAS1-RIPE
status:         ASSIGNED PA
mnt-by:         INTERB-MNT
created:        2010-11-17T16:45:03Z
last-modified:  2010-11-17T16:45:03Z
source:         RIPE # Filtered

role:           Interbusiness Network Administration Staff
address:        Telecom Italia S.p.A
address:        Italy
admin-c:        ESB35-RIPE
tech-c:         ESB35-RIPE
tech-c:         ASB144-RIPE
tech-c:         ABT49-RIPE
nic-hdl:        INAS1-RIPE
abuse-mailbox:  abuse@business.telecomitalia.it
mnt-by:         INTERB-MNT
created:        2002-08-01T12:20:54Z
last-modified:  2024-01-16T08:51:36Z
source:         RIPE # Filtered

% Information related to '2.118.0.0/15AS3269'

route:          2.118.0.0/15
descr:          INTERBUSINESS
origin:         AS3269
remarks:        ************************************************
remarks:        * Pay attention *
remarks:        * Any communication sent to email different *
remarks:        * from the following will be ignored! *
remarks:        * Any abuse reports, please send them to *
remarks:        * abuse@business.telecomitalia.it *
remarks:        ************************************************
mnt-by:         INTERB-MNT
created:        2010-08-05T08:21:53Z
last-modified:  2017-07-17T12:18:58Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.118.107.208
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.118.107.208.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041000 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 10 23:25:14 CST 2026
;; MSG SIZE  rcvd: 106
Host info
208.107.118.2.in-addr.arpa domain name pointer host-2-118-107-208.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
208.107.118.2.in-addr.arpa	name = host-2-118-107-208.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.175.132.77 attackbots
Contact Form Spam
2019-07-08 00:52:48
142.11.217.171 attackspam
TCP Port: 25 _    invalid blocked barracudacentral zen-spamhaus _  _  _ _ (380)
2019-07-08 00:14:53
107.170.193.91 attack
39054/tcp 39153/tcp 27018/tcp...
[2019-05-13/07-07]26pkt,24pt.(tcp),1pt.(udp)
2019-07-08 00:58:53
165.227.69.39 attackbots
ssh failed login
2019-07-08 00:44:13
77.247.110.153 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-08 01:03:00
94.191.3.81 attack
SSH Brute Force, server-1 sshd[28528]: Failed password for invalid user katrina from 94.191.3.81 port 46208 ssh2
2019-07-08 00:30:52
74.82.47.32 attackspambots
548/tcp 389/tcp 445/tcp...
[2019-05-07/07-06]40pkt,15pt.(tcp),1pt.(udp)
2019-07-08 00:49:44
178.46.167.192 attack
Brute force attempt
2019-07-08 00:54:00
180.241.236.60 attack
Jul  7 15:42:29 62-210-73-4 sshd\[5914\]: Invalid user admin1 from 180.241.236.60 port 51781
Jul  7 15:42:31 62-210-73-4 sshd\[5914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.236.60
...
2019-07-08 00:11:35
191.240.24.208 attackbots
smtp auth brute force
2019-07-08 00:57:11
198.108.67.101 attackspam
Sun 07 08:42:00 2985/tcp
2019-07-08 01:03:28
77.247.110.216 attack
\[2019-07-07 12:03:03\] NOTICE\[13443\] chan_sip.c: Registration from '"306" \' failed for '77.247.110.216:6230' - Wrong password
\[2019-07-07 12:03:03\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-07T12:03:03.997-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="306",SessionID="0x7f02f876b078",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.216/6230",Challenge="13efb9a5",ReceivedChallenge="13efb9a5",ReceivedHash="bf7353e34331f8b8e291ede4127fae06"
\[2019-07-07 12:03:04\] NOTICE\[13443\] chan_sip.c: Registration from '"306" \' failed for '77.247.110.216:6230' - Wrong password
\[2019-07-07 12:03:04\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-07T12:03:04.109-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="306",SessionID="0x7f02f88cef08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
2019-07-08 00:25:22
216.218.206.78 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-07-08 00:56:50
104.216.143.210 attackbots
Jul  7 17:53:47 vpn01 sshd\[1441\]: Invalid user staff from 104.216.143.210
Jul  7 17:53:47 vpn01 sshd\[1441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.216.143.210
Jul  7 17:53:49 vpn01 sshd\[1441\]: Failed password for invalid user staff from 104.216.143.210 port 42650 ssh2
2019-07-08 00:59:13
129.250.206.86 attackspambots
" "
2019-07-08 00:32:47

Recently Reported IPs

34.245.72.45 27.115.124.96 110.77.226.125 2606:4700:10::6816:1543
2606:4700:10::ac43:1089 2606:4700:10::6814:6169 2606:4700:10::6814:7349 2606:4700:10::6814:6360
34.62.197.208 103.27.185.63 139.59.95.112 35.175.141.39
2606:4700:10::6814:8422 2606:4700:10::6816:2061 2606:4700:10::6816:704 2606:4700:10::6814:5655
45.142.154.89 193.176.31.154 178.254.33.29 196.4.65.131