Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Geoje

Region: Gyeongsangnam-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.38.118.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23333
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.38.118.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 19:38:20 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 138.118.38.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 138.118.38.118.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
41.218.197.30 attack
Automatic report - SSH Brute-Force Attack
2019-07-05 09:57:05
218.76.140.155 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-07-05 10:09:09
168.228.148.132 attack
failed_logins
2019-07-05 09:35:54
37.49.225.249 attack
Brute force attack stopped by firewall
2019-07-05 09:34:53
46.229.168.143 attackbots
Brute force attack stopped by firewall
2019-07-05 10:08:38
220.225.7.42 attack
Brute force attack stopped by firewall
2019-07-05 09:52:47
144.76.162.206 attackspam
Brute force attack stopped by firewall
2019-07-05 09:39:26
134.209.4.137 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-05 10:09:51
120.209.164.118 attack
Brute force attack stopped by firewall
2019-07-05 10:02:48
61.163.69.170 attackbots
Brute force attack stopped by firewall
2019-07-05 09:58:49
134.209.157.162 attackbotsspam
Jul  5 04:22:44 vtv3 sshd\[11900\]: Invalid user kan from 134.209.157.162 port 49774
Jul  5 04:22:44 vtv3 sshd\[11900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.157.162
Jul  5 04:22:46 vtv3 sshd\[11900\]: Failed password for invalid user kan from 134.209.157.162 port 49774 ssh2
Jul  5 04:28:03 vtv3 sshd\[14360\]: Invalid user gitolite from 134.209.157.162 port 48720
Jul  5 04:28:03 vtv3 sshd\[14360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.157.162
Jul  5 04:38:13 vtv3 sshd\[19379\]: Invalid user nm from 134.209.157.162 port 40338
Jul  5 04:38:14 vtv3 sshd\[19379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.157.162
Jul  5 04:38:16 vtv3 sshd\[19379\]: Failed password for invalid user nm from 134.209.157.162 port 40338 ssh2
Jul  5 04:40:50 vtv3 sshd\[21085\]: Invalid user ftpuser from 134.209.157.162 port 38486
Jul  5 04:40:50 vtv3 sshd\[2
2019-07-05 10:16:20
222.116.194.220 attackspam
/0manager/ldskflks
2019-07-05 10:13:46
202.53.165.218 attackspam
Sending SPAM email
2019-07-05 09:45:23
206.189.27.201 attackbots
WordPress wp-login brute force :: 206.189.27.201 0.184 BYPASS [05/Jul/2019:08:53:49  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 4214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-05 10:05:33
37.49.227.176 attack
Brute force attack stopped by firewall
2019-07-05 09:35:37

Recently Reported IPs

36.240.168.236 94.233.74.238 147.135.184.141 211.5.74.224
172.137.138.166 79.76.250.227 103.195.92.186 160.198.104.225
40.71.100.145 93.140.50.238 199.212.233.175 97.209.86.181
186.210.5.50 200.157.93.46 154.173.238.7 156.196.230.63
103.37.154.140 82.106.110.96 221.142.182.74 116.228.75.66