Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wil

Region: Saint Gallen

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: Datapark AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.196.153.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56443
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.196.153.18.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 17:23:33 CST 2019
;; MSG SIZE  rcvd: 118
Host info
18.153.196.213.in-addr.arpa domain name pointer catv-153-018.tbwil.ch.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
18.153.196.213.in-addr.arpa	name = catv-153-018.tbwil.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.91.61.35 attackspambots
Unauthorized connection attempt from IP address 186.91.61.35 on Port 445(SMB)
2020-09-29 23:53:43
171.8.135.136 attackbotsspam
Sep 29 18:20:32 serwer sshd\[4503\]: Invalid user list1 from 171.8.135.136 port 9797
Sep 29 18:20:32 serwer sshd\[4503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.135.136
Sep 29 18:20:34 serwer sshd\[4503\]: Failed password for invalid user list1 from 171.8.135.136 port 9797 ssh2
...
2020-09-30 00:20:44
121.186.147.16 attackspam
" "
2020-09-30 00:23:17
92.222.93.104 attackspambots
Multiple SSH login attempts.
2020-09-30 00:30:02
27.223.99.130 attackspam
Invalid user test001 from 27.223.99.130 port 45398
2020-09-30 00:26:56
193.95.24.114 attackspambots
$f2bV_matches
2020-09-29 23:53:22
81.68.126.101 attackspambots
Invalid user mapred from 81.68.126.101 port 54586
2020-09-30 00:31:03
186.216.68.195 attackbots
Attempted Brute Force (dovecot)
2020-09-29 23:50:41
138.197.94.57 attack
Sep 29 15:16:06 host sshd[18668]: Invalid user wwwdata1 from 138.197.94.57 port 35364
...
2020-09-30 00:26:34
101.109.216.75 attack
Automatic report - Port Scan Attack
2020-09-30 00:30:45
47.247.114.33 attackbots
Sep 28 22:36:45 santamaria sshd\[16344\]: Invalid user avanthi from 47.247.114.33
Sep 28 22:36:45 santamaria sshd\[16344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.247.114.33
Sep 28 22:36:47 santamaria sshd\[16344\]: Failed password for invalid user avanthi from 47.247.114.33 port 53402 ssh2
...
2020-09-29 23:47:26
187.33.82.34 attackspambots
20/9/28@16:36:09: FAIL: Alarm-Network address from=187.33.82.34
...
2020-09-30 00:18:48
137.116.91.11 attackspambots
Port Scan detected!
...
2020-09-30 00:25:25
5.188.62.147 attack
5.188.62.147 - - \[29/Sep/2020:16:20:31 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 6.2\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2224.3 Safari/537.36"
5.188.62.147 - - \[29/Sep/2020:16:20:32 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2226.0 Safari/537.36"
5.188.62.147 - - \[29/Sep/2020:16:20:33 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 5.1\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2228.0 Safari/537.36"
2020-09-30 00:13:45
133.130.74.241 attackbotsspam
xmlrpc attack
2020-09-30 00:08:40

Recently Reported IPs

124.86.240.40 195.154.221.54 35.45.188.132 123.21.11.47
96.94.66.83 128.169.97.121 201.213.127.132 195.74.255.212
74.25.230.38 87.42.97.40 255.121.62.24 102.169.57.81
185.222.211.13 126.101.149.133 142.114.168.208 99.52.74.38
191.28.212.186 160.182.250.182 13.54.27.80 142.93.91.150