Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.218.188.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.218.188.139.			IN	A

;; AUTHORITY SECTION:
.			53	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:56:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 139.188.218.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.188.218.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.245.205.162 attackspam
spam
2020-08-17 13:29:09
190.151.94.2 attackspambots
spam
2020-08-17 13:52:23
149.56.15.98 attackspam
Invalid user toro from 149.56.15.98 port 58239
2020-08-17 13:22:00
80.82.70.118 attackspam
Aug 17 06:44:55 mail postfix/smtpd[10499]: lost connection after STARTTLS from unknown[80.82.70.118]
2020-08-17 13:14:10
58.182.68.5 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 5.68.182.58.starhub.net.sg.
2020-08-17 13:47:18
169.255.190.18 attackspam
spam
2020-08-17 13:33:16
45.224.208.9 attack
spam
2020-08-17 13:47:46
46.101.40.21 attackbotsspam
Aug 17 07:00:41 minden010 sshd[32545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
Aug 17 07:00:43 minden010 sshd[32545]: Failed password for invalid user testuser from 46.101.40.21 port 51508 ssh2
Aug 17 07:04:26 minden010 sshd[1384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21
...
2020-08-17 13:24:35
121.122.0.65 attack
C1,WP GET /wp-login.php
2020-08-17 13:34:47
45.70.112.186 attackbots
spam
2020-08-17 13:37:02
187.111.192.186 attackbots
spam
2020-08-17 13:31:26
61.177.172.128 attackspambots
Aug 17 07:07:10 vm0 sshd[13842]: Failed password for root from 61.177.172.128 port 6448 ssh2
Aug 17 07:07:23 vm0 sshd[13842]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 6448 ssh2 [preauth]
...
2020-08-17 13:16:39
122.51.119.18 attackspambots
2020-08-17T05:18:45.701568shield sshd\[11050\]: Invalid user user1 from 122.51.119.18 port 60996
2020-08-17T05:18:45.711357shield sshd\[11050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.119.18
2020-08-17T05:18:47.831616shield sshd\[11050\]: Failed password for invalid user user1 from 122.51.119.18 port 60996 ssh2
2020-08-17T05:23:45.529305shield sshd\[11460\]: Invalid user ld from 122.51.119.18 port 41030
2020-08-17T05:23:45.538495shield sshd\[11460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.119.18
2020-08-17 13:45:40
62.173.149.250 attack
spam
2020-08-17 13:26:41
103.230.153.131 attackbotsspam
spam
2020-08-17 13:13:19

Recently Reported IPs

0.206.186.82 0.212.119.133 0.207.131.249 0.206.92.209
0.211.53.41 0.218.226.140 0.212.183.212 0.208.88.101
0.208.43.228 0.21.108.237 0.209.244.136 0.213.233.71
0.211.71.76 0.209.75.23 0.216.48.226 0.208.195.186
0.216.170.164 0.218.60.24 0.213.143.120 0.220.184.164