Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.52.214.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54885
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;118.52.214.178.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052802 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 10:15:51 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 178.214.52.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 178.214.52.118.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
49.148.210.24 attackspambots
445/tcp
[2019-06-22]1pkt
2019-06-23 03:10:57
172.245.1.24 attackspam
NAME : NET-172-245-0-0-1 CIDR : 172.245.0.0/24 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Colorado - block certain countries :) IP: 172.245.1.24  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 03:52:33
179.99.180.51 attack
SSH invalid-user multiple login attempts
2019-06-23 03:18:35
182.75.107.46 attackspambots
Automatic report - Web App Attack
2019-06-23 03:24:21
80.82.78.104 attackbotsspam
Port scan
2019-06-23 03:28:22
2a02:a31d:843b:e900:f8cc:3934:49b9:70a attackbots
PHI,WP GET /wp-login.php
2019-06-23 03:41:38
221.231.31.209 attackbotsspam
Jun 22 16:40:13 mail sshd\[30863\]: Invalid user admin from 221.231.31.209
Jun 22 16:40:13 mail sshd\[30863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.231.31.209
Jun 22 16:40:14 mail sshd\[30863\]: Failed password for invalid user admin from 221.231.31.209 port 36749 ssh2
Jun 22 16:40:16 mail sshd\[30863\]: Failed password for invalid user admin from 221.231.31.209 port 36749 ssh2
Jun 22 16:40:19 mail sshd\[30863\]: Failed password for invalid user admin from 221.231.31.209 port 36749 ssh2
2019-06-23 03:18:12
89.132.74.172 attackspam
Jun 22 21:24:34 srv-4 sshd\[10533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.132.74.172  user=root
Jun 22 21:24:34 srv-4 sshd\[10535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.132.74.172  user=root
Jun 22 21:24:36 srv-4 sshd\[10533\]: Failed password for root from 89.132.74.172 port 48940 ssh2
...
2019-06-23 03:05:47
110.54.236.252 attack
445/tcp
[2019-06-22]1pkt
2019-06-23 03:06:37
121.200.209.132 attack
firewall-block, port(s): 8080/tcp
2019-06-23 03:25:13
201.46.61.160 attackspambots
SMTP-sasl brute force
...
2019-06-23 03:23:01
51.38.90.195 attack
Jun 22 10:37:11 bilbo sshd\[26604\]: Invalid user mi from 51.38.90.195\
Jun 22 10:37:13 bilbo sshd\[26604\]: Failed password for invalid user mi from 51.38.90.195 port 57754 ssh2\
Jun 22 10:40:07 bilbo sshd\[27570\]: Invalid user info from 51.38.90.195\
Jun 22 10:40:09 bilbo sshd\[27570\]: Failed password for invalid user info from 51.38.90.195 port 51750 ssh2\
2019-06-23 03:25:30
123.207.119.77 attackspam
10 attempts against mh-pma-try-ban on grass.magehost.pro
2019-06-23 03:22:34
177.72.36.5 attackbotsspam
SMTP-sasl brute force
...
2019-06-23 03:21:05
190.220.31.11 attack
Jun 22 17:18:10 s1 sshd\[10938\]: Invalid user user from 190.220.31.11 port 36104
Jun 22 17:18:10 s1 sshd\[10938\]: Failed password for invalid user user from 190.220.31.11 port 36104 ssh2
Jun 22 17:20:24 s1 sshd\[11903\]: Invalid user shei from 190.220.31.11 port 54050
Jun 22 17:20:24 s1 sshd\[11903\]: Failed password for invalid user shei from 190.220.31.11 port 54050 ssh2
Jun 22 17:22:01 s1 sshd\[11990\]: Invalid user ren from 190.220.31.11 port 39476
Jun 22 17:22:01 s1 sshd\[11990\]: Failed password for invalid user ren from 190.220.31.11 port 39476 ssh2
...
2019-06-23 04:00:15

Recently Reported IPs

177.154.139.202 187.76.239.195 179.191.67.142 88.129.208.50
115.202.126.247 185.165.168.166 175.6.100.58 200.85.53.122
103.219.206.201 109.188.90.100 14.161.20.40 193.242.195.222
220.128.59.113 14.177.235.153 182.73.47.190 107.77.195.235
139.191.237.238 218.107.49.71 47.28.167.91 5.9.144.234