Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Belgium

Internet Service Provider: Proximus

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.203.212.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.203.212.18.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021110200 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 02 22:10:44 CST 2021
;; MSG SIZE  rcvd: 107
Host info
Host 18.212.203.138.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 138.203.212.18.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.200.26.226 attackbots
5555/tcp 23/tcp...
[2019-07-14/08-12]4pkt,2pt.(tcp)
2019-08-13 11:47:38
36.26.1.30 attack
Unauthorized connection attempt from IP address 36.26.1.30 on Port 445(SMB)
2019-08-13 11:41:32
131.100.76.97 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:40:06
143.0.140.62 attack
SASL PLAIN auth failed: ruser=...
2019-08-13 11:33:17
159.89.200.32 attack
20022/tcp 18022/tcp 17022/tcp...
[2019-06-21/08-12]13pkt,8pt.(tcp)
2019-08-13 12:01:46
138.122.37.153 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:35:22
36.91.102.138 attackbotsspam
8282/tcp 445/tcp 8000/tcp...
[2019-06-13/08-12]7pkt,6pt.(tcp)
2019-08-13 12:00:54
163.44.150.102 attackbots
Brute forcing Wordpress login
2019-08-13 12:09:16
131.100.77.29 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:38:56
129.232.239.122 attackbots
Brute forcing Wordpress login
2019-08-13 12:13:20
212.42.103.112 attackbotsspam
Aug 13 02:25:06 MK-Soft-VM5 sshd\[4025\]: Invalid user xapolicymgr from 212.42.103.112 port 11300
Aug 13 02:25:06 MK-Soft-VM5 sshd\[4025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.42.103.112
Aug 13 02:25:08 MK-Soft-VM5 sshd\[4025\]: Failed password for invalid user xapolicymgr from 212.42.103.112 port 11300 ssh2
...
2019-08-13 11:42:13
95.154.252.102 attack
Brute forcing Wordpress login
2019-08-13 12:15:15
92.53.90.143 attackspam
Aug 12 16:35:09 localhost kernel: [16886302.777726] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.53.90.143 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x20 TTL=246 ID=24517 PROTO=TCP SPT=46147 DPT=4119 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 12 16:35:09 localhost kernel: [16886302.777751] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.53.90.143 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x20 TTL=246 ID=24517 PROTO=TCP SPT=46147 DPT=4119 SEQ=435629996 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 12 18:08:41 localhost kernel: [16891914.366611] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.53.90.143 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x20 TTL=246 ID=54263 PROTO=TCP SPT=46147 DPT=4306 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 12 18:08:41 localhost kernel: [16891914.366637] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.53.90.143 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=
2019-08-13 11:58:52
87.98.233.162 attackbotsspam
Brute forcing Wordpress login
2019-08-13 12:16:21
213.32.44.6 attackspam
Brute forcing Wordpress login
2019-08-13 12:03:58

Recently Reported IPs

51.161.116.41 166.216.158.168 201.127.128.233 37.186.44.50
2605:8d80:564:745a:ed9e:4615:6773:7bf9 47.101.180.113 88.151.13.212 23.55.205.135
105.73.3.1 180.125.96.210 51.195.76.119 87.117.63.177
175.107.236.113 37.111.140.0 138.68.21.56 172.16.250.200
194.61.55.88 125.164.18.29 138.185.25.55 165.227.74.151