Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guro-gu

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.36.207.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45630
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.36.207.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 04:30:45 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 21.207.36.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 21.207.36.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.97.249.74 attack
detected by Fail2Ban
2019-12-21 16:21:22
120.88.185.39 attack
Dec 21 09:07:25 ns381471 sshd[15443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.185.39
Dec 21 09:07:27 ns381471 sshd[15443]: Failed password for invalid user cid from 120.88.185.39 port 54102 ssh2
2019-12-21 16:24:53
118.97.77.114 attack
Dec 20 21:44:39 tdfoods sshd\[11098\]: Invalid user frickey from 118.97.77.114
Dec 20 21:44:39 tdfoods sshd\[11098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.114
Dec 20 21:44:41 tdfoods sshd\[11098\]: Failed password for invalid user frickey from 118.97.77.114 port 55862 ssh2
Dec 20 21:51:22 tdfoods sshd\[11744\]: Invalid user server from 118.97.77.114
Dec 20 21:51:22 tdfoods sshd\[11744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.77.114
2019-12-21 16:07:01
211.227.23.193 attackspambots
Dec 21 01:41:42 linuxvps sshd\[30433\]: Invalid user phoenixtv from 211.227.23.193
Dec 21 01:41:42 linuxvps sshd\[30433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.227.23.193
Dec 21 01:41:44 linuxvps sshd\[30433\]: Failed password for invalid user phoenixtv from 211.227.23.193 port 41881 ssh2
Dec 21 01:48:02 linuxvps sshd\[34493\]: Invalid user glendora from 211.227.23.193
Dec 21 01:48:02 linuxvps sshd\[34493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.227.23.193
2019-12-21 16:04:11
207.44.28.234 attack
Unauthorized connection attempt detected from IP address 207.44.28.234 to port 81
2019-12-21 16:27:05
80.108.220.67 attack
Dec 21 00:57:58 server sshd\[19732\]: Failed password for invalid user maugey from 80.108.220.67 port 50312 ssh2
Dec 21 08:25:00 server sshd\[11760\]: Invalid user hipson from 80.108.220.67
Dec 21 08:25:00 server sshd\[11760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80-108-220-67.cable.dynamic.surfer.at 
Dec 21 08:25:03 server sshd\[11760\]: Failed password for invalid user hipson from 80.108.220.67 port 46408 ssh2
Dec 21 11:22:28 server sshd\[27565\]: Invalid user dkpal from 80.108.220.67
...
2019-12-21 16:32:16
173.219.87.131 attackbotsspam
Dec 21 03:21:58 firewall sshd[32545]: Invalid user gamble from 173.219.87.131
Dec 21 03:22:00 firewall sshd[32545]: Failed password for invalid user gamble from 173.219.87.131 port 56667 ssh2
Dec 21 03:28:49 firewall sshd[32754]: Invalid user awiracmis from 173.219.87.131
...
2019-12-21 16:24:16
62.210.37.82 attackbots
Unauthorized access detected from banned ip
2019-12-21 16:27:28
104.236.142.200 attack
Dec 21 07:48:19 web8 sshd\[29831\]: Invalid user chardon from 104.236.142.200
Dec 21 07:48:19 web8 sshd\[29831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
Dec 21 07:48:21 web8 sshd\[29831\]: Failed password for invalid user chardon from 104.236.142.200 port 39674 ssh2
Dec 21 07:54:03 web8 sshd\[32635\]: Invalid user weenie from 104.236.142.200
Dec 21 07:54:03 web8 sshd\[32635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
2019-12-21 16:02:49
107.170.18.163 attackspam
Dec 21 07:29:13 localhost sshd\[2071\]: Invalid user ident from 107.170.18.163 port 36860
Dec 21 07:29:13 localhost sshd\[2071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.18.163
Dec 21 07:29:15 localhost sshd\[2071\]: Failed password for invalid user ident from 107.170.18.163 port 36860 ssh2
2019-12-21 16:03:12
81.130.234.235 attackbots
Dec 21 08:34:11 MK-Soft-VM6 sshd[12511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.234.235 
Dec 21 08:34:13 MK-Soft-VM6 sshd[12511]: Failed password for invalid user bittmann from 81.130.234.235 port 57683 ssh2
...
2019-12-21 16:26:16
51.161.12.231 attack
Dec 21 08:53:59 debian-2gb-nbg1-2 kernel: \[567596.970941\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.161.12.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=10978 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-21 16:19:02
185.176.27.178 attackbots
Dec 21 09:36:25 debian-2gb-nbg1-2 kernel: \[570142.998729\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=36930 PROTO=TCP SPT=59403 DPT=33283 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-21 16:38:37
106.13.48.20 attack
Dec 21 07:15:03 dev0-dcde-rnet sshd[28975]: Failed password for root from 106.13.48.20 port 39378 ssh2
Dec 21 07:21:30 dev0-dcde-rnet sshd[29047]: Failed password for root from 106.13.48.20 port 33194 ssh2
2019-12-21 16:42:10
116.26.84.214 attackbots
Automatic report - Port Scan Attack
2019-12-21 16:29:28

Recently Reported IPs

18.38.165.83 168.161.204.176 134.238.98.110 88.247.152.133
61.28.227.178 93.167.225.156 205.154.173.122 185.162.40.149
214.204.158.141 90.8.184.38 179.8.133.111 185.128.26.23
85.73.137.158 179.64.48.171 86.14.122.17 129.22.83.63
36.68.239.163 104.215.95.166 63.79.201.201 112.233.42.192