Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Vivo

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.242.63.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.242.63.18.			IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 16:05:57 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 18.63.242.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.63.242.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.40.13.97 attack
TCP Port: 25 _    invalid blocked  abuseat-org also zen-spamhaus _  _  _ _ (2349)
2019-10-20 06:23:38
222.186.190.92 attackbotsspam
2019-10-08T14:21:31.648688homeassistant sshd[6941]: Failed none for root from 222.186.190.92 port 44668 ssh2
2019-10-08T14:21:32.883834homeassistant sshd[6941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
...
2019-10-20 06:43:32
142.93.232.144 attackbots
Oct 19 22:00:43 email sshd\[7697\]: Invalid user christian from 142.93.232.144
Oct 19 22:00:43 email sshd\[7697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.144
Oct 19 22:00:45 email sshd\[7697\]: Failed password for invalid user christian from 142.93.232.144 port 42802 ssh2
Oct 19 22:09:47 email sshd\[9425\]: Invalid user christine from 142.93.232.144
Oct 19 22:09:47 email sshd\[9425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.144
...
2019-10-20 06:30:16
82.244.142.232 attackbots
Game Studio: Keeps hacking into players accounts of a leak database.
2019-10-20 06:45:13
103.121.195.34 attackspambots
Invalid user user1 from 103.121.195.34 port 41362
2019-10-20 06:41:47
106.13.181.170 attackbots
Oct 19 23:16:49 vmanager6029 sshd\[3313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.170  user=root
Oct 19 23:16:51 vmanager6029 sshd\[3313\]: Failed password for root from 106.13.181.170 port 10329 ssh2
Oct 19 23:21:11 vmanager6029 sshd\[3385\]: Invalid user si from 106.13.181.170 port 49797
2019-10-20 06:55:17
123.204.85.45 attack
Fail2Ban Ban Triggered
2019-10-20 06:32:34
106.75.148.95 attackspam
Oct 19 22:10:26 SilenceServices sshd[31593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.95
Oct 19 22:10:28 SilenceServices sshd[31593]: Failed password for invalid user monitor from 106.75.148.95 port 40080 ssh2
Oct 19 22:14:27 SilenceServices sshd[1693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.95
2019-10-20 06:47:30
191.96.25.105 attackbotsspam
Oct 20 00:21:45 bouncer sshd\[22258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105  user=root
Oct 20 00:21:47 bouncer sshd\[22258\]: Failed password for root from 191.96.25.105 port 44618 ssh2
Oct 20 00:42:55 bouncer sshd\[22413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.96.25.105  user=root
...
2019-10-20 06:53:54
222.94.73.201 attack
SSH Brute Force, server-1 sshd[12136]: Failed password for invalid user developer from 222.94.73.201 port 23488 ssh2
2019-10-20 06:37:37
69.245.140.249 attackspam
(From iola.mccoll@outlook.com) Sick of wasting money on PPC advertising that just doesn't deliver? Now you can post your ad on thousands of advertising sites and it'll only cost you one flat fee per month. These ads stay up forever, this is a continual supply of organic visitors! To find out more check out our site here: http://postmoreads.net.n3t.store
2019-10-20 06:40:23
82.202.212.60 attackbots
no
2019-10-20 06:49:37
2607:f8b0:4000:811::200a attack
11:30 P.M. 09/19/19
Hacking Android system
2019-10-20 06:42:08
109.185.181.14 attack
Automatic report - Banned IP Access
2019-10-20 06:57:21
167.114.251.164 attackbots
Oct 20 00:36:08 xeon sshd[48579]: Failed password for invalid user iemergen from 167.114.251.164 port 49005 ssh2
2019-10-20 07:01:04

Recently Reported IPs

140.123.124.86 210.72.10.85 124.16.140.35 202.29.224.226
140.117.69.1 140.116.67.29 141.35.104.106 217.173.194.18
140.116.10.6 159.226.176.87 89.45.27.76 140.116.233.154
140.116.71.92 51.158.182.83 141.212.123.226 144.173.65.129
150.212.127.60 140.116.48.102 131.246.182.216 200.20.0.193