Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.40.8.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.40.8.149.			IN	A

;; AUTHORITY SECTION:
.			442	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 12 01:10:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 149.8.40.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.8.40.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.224.2.202 attack
IMAP brute force
...
2019-10-16 20:07:40
218.188.217.102 attackbots
DATE:2019-10-16 13:24:22, IP:218.188.217.102, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-16 20:12:01
81.22.45.165 attack
*Port Scan* detected from 81.22.45.165 (RU/Russia/-). 4 hits in the last 200 seconds
2019-10-16 19:45:59
185.232.67.5 attackbots
[portscan] tcp/22 [SSH]
[scan/connect: 250 time(s)]
in blocklist.de:'listed [ssh]'
in spfbl.net:'listed'
*(RWIN=29200)(10161238)
2019-10-16 20:13:15
185.211.245.198 attackspam
Oct 16 13:21:39 mail postfix/smtpd\[19433\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 16 13:21:47 mail postfix/smtpd\[19433\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 16 13:25:58 mail postfix/smtpd\[19458\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 16 14:03:38 mail postfix/smtpd\[20636\]: warning: unknown\[185.211.245.198\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-16 20:06:47
157.119.29.22 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 20:11:04
125.129.83.208 attackspam
Oct 16 01:38:22 eddieflores sshd\[13955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.83.208  user=root
Oct 16 01:38:24 eddieflores sshd\[13955\]: Failed password for root from 125.129.83.208 port 41688 ssh2
Oct 16 01:43:01 eddieflores sshd\[14369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.83.208  user=root
Oct 16 01:43:03 eddieflores sshd\[14369\]: Failed password for root from 125.129.83.208 port 53504 ssh2
Oct 16 01:47:41 eddieflores sshd\[14723\]: Invalid user office from 125.129.83.208
Oct 16 01:47:41 eddieflores sshd\[14723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.129.83.208
2019-10-16 20:01:59
190.223.26.38 attack
Oct 16 13:39:02 eventyay sshd[19500]: Failed password for root from 190.223.26.38 port 27949 ssh2
Oct 16 13:43:37 eventyay sshd[19592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38
Oct 16 13:43:40 eventyay sshd[19592]: Failed password for invalid user telefony from 190.223.26.38 port 10976 ssh2
...
2019-10-16 19:48:12
139.162.86.84 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 19:42:50
159.203.201.88 attackbots
firewall-block, port(s): 34186/tcp
2019-10-16 19:40:23
43.248.123.194 attackspambots
Oct 16 11:20:33 venus sshd\[8382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.123.194  user=root
Oct 16 11:20:34 venus sshd\[8382\]: Failed password for root from 43.248.123.194 port 50282 ssh2
Oct 16 11:25:12 venus sshd\[8495\]: Invalid user 123 from 43.248.123.194 port 33566
Oct 16 11:25:12 venus sshd\[8495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.123.194
...
2019-10-16 19:37:39
139.59.169.37 attackbots
Oct 16 13:49:54 meumeu sshd[10279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37 
Oct 16 13:49:57 meumeu sshd[10279]: Failed password for invalid user remo from 139.59.169.37 port 54530 ssh2
Oct 16 13:54:16 meumeu sshd[11123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.37 
...
2019-10-16 20:00:42
213.45.83.55 attack
port scan and connect, tcp 23 (telnet)
2019-10-16 20:02:20
177.125.164.225 attackspambots
F2B jail: sshd. Time: 2019-10-16 13:56:10, Reported by: VKReport
2019-10-16 19:57:56
185.209.0.92 attack
firewall-block, port(s): 3504/tcp, 3506/tcp, 3526/tcp, 3530/tcp, 3534/tcp
2019-10-16 19:54:35

Recently Reported IPs

61.255.54.10 211.218.66.79 103.149.87.228 103.250.140.93
124.230.6.62 107.172.37.215 36.85.133.142 5.62.63.190
38.49.129.154 50.7.60.76 177.87.1.28 183.157.171.167
180.116.240.38 58.209.133.185 196.51.75.227 178.46.205.99
212.60.20.225 94.131.81.27 42.192.227.190 43.142.130.241