Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.122.109.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13043
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.122.109.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 16:28:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 18.109.122.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.109.122.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.229 attack
5x Failed Password
2020-04-15 13:35:28
195.154.133.163 attackbots
195.154.133.163 - - [15/Apr/2020:08:56:35 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-04-15 12:57:22
113.183.36.115 attack
SpamScore above: 10.0
2020-04-15 13:17:51
103.133.205.34 attackbots
SpamScore above: 10.0
2020-04-15 13:19:09
103.78.81.227 attackbotsspam
5x Failed Password
2020-04-15 13:09:31
142.93.235.47 attackspambots
2020-04-15T06:59:11.820325librenms sshd[29893]: Invalid user zxin10 from 142.93.235.47 port 42716
2020-04-15T06:59:14.087141librenms sshd[29893]: Failed password for invalid user zxin10 from 142.93.235.47 port 42716 ssh2
2020-04-15T07:03:06.661764librenms sshd[30385]: Invalid user b from 142.93.235.47 port 51510
...
2020-04-15 13:26:54
196.52.43.105 attack
Automatic report - Banned IP Access
2020-04-15 13:26:07
167.250.49.150 attack
Bruteforce detected by fail2ban
2020-04-15 12:58:16
115.159.51.239 attackspam
Invalid user Duck from 115.159.51.239 port 35834
2020-04-15 13:22:37
222.186.52.78 attackbotsspam
Apr 15 01:21:24 ny01 sshd[24808]: Failed password for root from 222.186.52.78 port 45216 ssh2
Apr 15 01:23:50 ny01 sshd[25089]: Failed password for root from 222.186.52.78 port 43422 ssh2
2020-04-15 13:32:59
51.132.145.250 attackbots
Apr 15 05:58:59 ns3164893 sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.132.145.250
Apr 15 05:59:01 ns3164893 sshd[2897]: Failed password for invalid user t3rr0r from 51.132.145.250 port 52978 ssh2
...
2020-04-15 12:56:26
171.234.76.88 attackbots
20/4/14@23:58:14: FAIL: Alarm-Network address from=171.234.76.88
20/4/14@23:58:14: FAIL: Alarm-Network address from=171.234.76.88
...
2020-04-15 13:26:26
179.184.59.109 attackspambots
Apr 15 04:45:41 game-panel sshd[26107]: Failed password for root from 179.184.59.109 port 60520 ssh2
Apr 15 04:49:38 game-panel sshd[26243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.59.109
Apr 15 04:49:41 game-panel sshd[26243]: Failed password for invalid user user from 179.184.59.109 port 58228 ssh2
2020-04-15 13:04:56
200.89.178.229 attackbots
Apr 15 03:48:40 XXXXXX sshd[45526]: Invalid user j from 200.89.178.229 port 58008
2020-04-15 13:25:37
222.186.30.35 attackspambots
Brute-force attempt banned
2020-04-15 13:37:01

Recently Reported IPs

14.198.254.175 98.11.126.97 166.6.83.15 89.228.215.239
215.15.135.84 138.12.181.168 254.115.48.8 174.169.60.0
196.116.69.182 150.70.40.94 135.177.206.57 88.113.81.151
207.66.219.28 115.217.195.116 97.65.139.181 249.233.141.103
212.122.125.202 115.20.148.112 82.159.169.220 119.150.56.156