Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       192.168.0.0 - 192.168.255.255
CIDR:           192.168.0.0/16
NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
NetHandle:      NET-192-168-0-0-1
Parent:         NET192 (NET-192-0-0-0-0)
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        1994-03-15
Updated:        2024-05-24
Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:        
Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
Comment:        
Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment:        http://datatracker.ietf.org/doc/rfc1918
Ref:            https://rdap.arin.net/registry/ip/192.168.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.168.5.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.168.5.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091801 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 19 04:56:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 218.5.168.192.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.5.168.192.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.185.238.166 attack
Unauthorized connection attempt detected from IP address 119.185.238.166 to port 6656 [T]
2020-01-30 09:05:26
145.14.133.252 attackbots
Jan 30 02:11:30 OPSO sshd\[18842\]: Invalid user tamanna from 145.14.133.252 port 34546
Jan 30 02:11:30 OPSO sshd\[18842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.14.133.252
Jan 30 02:11:32 OPSO sshd\[18842\]: Failed password for invalid user tamanna from 145.14.133.252 port 34546 ssh2
Jan 30 02:15:32 OPSO sshd\[20759\]: Invalid user indradhwaja from 145.14.133.252 port 50888
Jan 30 02:15:32 OPSO sshd\[20759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.14.133.252
2020-01-30 09:42:27
60.172.74.185 attackspam
Unauthorized connection attempt detected from IP address 60.172.74.185 to port 6656 [T]
2020-01-30 09:11:51
195.154.93.245 attack
Attempted upload of known exploit via /wp-content/plugins/cherry-plugin/admin/import-export/upload.php
2020-01-30 09:46:12
180.254.109.214 attackbotsspam
1580346917 - 01/30/2020 02:15:17 Host: 180.254.109.214/180.254.109.214 Port: 445 TCP Blocked
2020-01-30 09:54:03
106.13.84.75 attackspam
Jan 29 15:44:28 eddieflores sshd\[16798\]: Invalid user haravali from 106.13.84.75
Jan 29 15:44:28 eddieflores sshd\[16798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.75
Jan 29 15:44:30 eddieflores sshd\[16798\]: Failed password for invalid user haravali from 106.13.84.75 port 40166 ssh2
Jan 29 15:47:51 eddieflores sshd\[17233\]: Invalid user thangavel from 106.13.84.75
Jan 29 15:47:51 eddieflores sshd\[17233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.75
2020-01-30 09:48:32
123.179.92.151 attackspambots
Unauthorized connection attempt detected from IP address 123.179.92.151 to port 6656 [T]
2020-01-30 09:02:28
178.218.101.50 attack
TCP Port Scanning
2020-01-30 09:41:56
68.183.31.138 attackbots
11300/tcp
[2020-01-29]1pkt
2020-01-30 09:40:10
161.142.225.186 attack
Unauthorized connection attempt from IP address 161.142.225.186 on Port 445(SMB)
2020-01-30 09:44:49
115.237.69.3 attackbotsspam
Unauthorized connection attempt detected from IP address 115.237.69.3 to port 6656 [T]
2020-01-30 09:07:58
106.53.72.119 attackspambots
Jan 30 03:33:12 hosting sshd[32612]: Invalid user devika from 106.53.72.119 port 51098
Jan 30 03:33:12 hosting sshd[32612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.72.119
Jan 30 03:33:12 hosting sshd[32612]: Invalid user devika from 106.53.72.119 port 51098
Jan 30 03:33:13 hosting sshd[32612]: Failed password for invalid user devika from 106.53.72.119 port 51098 ssh2
Jan 30 03:52:33 hosting sshd[2074]: Invalid user modini from 106.53.72.119 port 57810
...
2020-01-30 09:10:12
171.34.179.95 attack
Unauthorized connection attempt detected from IP address 171.34.179.95 to port 5269 [T]
2020-01-30 09:00:06
123.156.190.46 attackbots
Unauthorized connection attempt detected from IP address 123.156.190.46 to port 6656 [T]
2020-01-30 09:03:13
106.253.252.218 attackspam
Unauthorized connection attempt detected from IP address 106.253.252.218 to port 80 [J]
2020-01-30 09:09:58

Recently Reported IPs

45.134.13.211 118.89.233.234 87.236.176.5 185.247.137.76
2409:8929:6f28:84e0:ec1d:28ff:fe1f:415f 240e:440:1210:37f9:1842:6e1a:3c8a:fa2f 159.223.195.64 78.128.114.98
20.163.15.96 59.82.83.47 59.82.83.168 223.104.162.103
57.158.76.231 158.94.208.219 2603:10b6:101:21::3 192.168.2.200
161.35.11.45 65.58.176.203 64.62.156.137 118.249.231.51