Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.18.109.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.18.109.147.			IN	A

;; AUTHORITY SECTION:
.			41	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:54:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 147.109.18.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.109.18.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.232.192.40 attack
Oct  4 20:54:47 db sshd[25895]: User root from 89.232.192.40 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-05 05:06:11
36.90.252.105 attackbotsspam
1601757674 - 10/03/2020 22:41:14 Host: 36.90.252.105/36.90.252.105 Port: 445 TCP Blocked
2020-10-05 05:08:01
185.169.17.232 attack
DATE:2020-10-03 22:38:39, IP:185.169.17.232, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-10-05 05:06:55
185.74.4.20 attackspam
Oct  5 02:02:08 itv-usvr-01 sshd[8140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.20  user=root
Oct  5 02:02:10 itv-usvr-01 sshd[8140]: Failed password for root from 185.74.4.20 port 56600 ssh2
Oct  5 02:06:00 itv-usvr-01 sshd[8271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.20  user=root
Oct  5 02:06:01 itv-usvr-01 sshd[8271]: Failed password for root from 185.74.4.20 port 35860 ssh2
2020-10-05 05:02:45
23.97.180.45 attackbots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-10-05 05:13:12
201.231.115.87 attackspam
vps:pam-generic
2020-10-05 05:08:42
110.49.71.246 attackspam
Oct  4 17:20:18 ncomp sshd[28810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.246  user=root
Oct  4 17:20:20 ncomp sshd[28810]: Failed password for root from 110.49.71.246 port 48049 ssh2
Oct  4 17:41:38 ncomp sshd[29234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.246  user=root
Oct  4 17:41:40 ncomp sshd[29234]: Failed password for root from 110.49.71.246 port 51570 ssh2
2020-10-05 04:37:04
112.85.42.119 attackspambots
Failed password for invalid user from 112.85.42.119 port 60624 ssh2
2020-10-05 05:10:13
109.102.31.87 attackbots
 TCP (SYN) 109.102.31.87:30358 -> port 8080, len 40
2020-10-05 04:44:06
159.65.64.76 attack
TCP port : 88
2020-10-05 05:09:06
138.68.95.204 attack
srv02 Mass scanning activity detected Target: 5144  ..
2020-10-05 05:04:57
186.89.248.169 attackbotsspam
Icarus honeypot on github
2020-10-05 04:59:09
106.12.174.227 attackbotsspam
Oct  5 03:33:52 itv-usvr-02 sshd[8675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.174.227  user=root
Oct  5 03:38:05 itv-usvr-02 sshd[8821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.174.227  user=root
Oct  5 03:42:07 itv-usvr-02 sshd[9039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.174.227  user=root
2020-10-05 05:12:46
51.81.119.1 attackspam
Unauthorised access (Oct  4) SRC=51.81.119.1 LEN=40 TTL=244 ID=4834 TCP DPT=8080 WINDOW=5840 SYN
2020-10-05 05:14:57
46.218.85.69 attackspam
Oct  4 18:46:16 vlre-nyc-1 sshd\[31692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
Oct  4 18:46:17 vlre-nyc-1 sshd\[31692\]: Failed password for root from 46.218.85.69 port 59301 ssh2
Oct  4 18:49:19 vlre-nyc-1 sshd\[31747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
Oct  4 18:49:22 vlre-nyc-1 sshd\[31747\]: Failed password for root from 46.218.85.69 port 46688 ssh2
Oct  4 18:51:00 vlre-nyc-1 sshd\[31793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.85.69  user=root
...
2020-10-05 05:09:27

Recently Reported IPs

102.16.140.118 126.255.100.197 134.207.82.101 6.42.157.194
129.27.51.121 100.206.115.147 144.145.137.135 217.160.38.189
109.5.91.134 253.129.99.244 206.22.97.5 234.181.236.75
107.88.102.255 103.109.56.45 225.109.17.236 235.158.142.183
161.163.30.13 24.208.114.199 227.219.201.87 151.135.96.157