Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santiago

Region: Region Metropolitana (RM)

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.241.18.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.241.18.140.			IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100600 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 00:55:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.18.241.216.in-addr.arpa domain name pointer antispam.grupoud.cl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.18.241.216.in-addr.arpa	name = antispam.grupoud.cl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2400:6180:0:d1::646:2001 attack
Automatic report - XMLRPC Attack
2019-10-12 10:04:41
115.53.7.40 attackspam
firewall-block, port(s): 23/tcp
2019-10-12 10:03:06
117.2.230.120 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:27.
2019-10-12 09:44:34
62.210.103.175 attackspam
10/12/2019-01:14:23.078157 62.210.103.175 Protocol: 17 ET SCAN Sipvicious Scan
2019-10-12 09:38:45
160.152.33.148 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:33.
2019-10-12 09:32:53
113.189.83.113 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:25.
2019-10-12 09:48:52
111.56.124.136 attackspambots
firewall-block, port(s): 23/tcp
2019-10-12 10:05:39
14.229.4.117 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:31.
2019-10-12 09:36:21
122.252.253.218 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:28.
2019-10-12 09:40:55
105.112.106.39 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:24.
2019-10-12 09:50:36
168.90.31.8 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:34.
2019-10-12 09:31:21
198.108.67.134 attackspam
firewall-block, port(s): 21/tcp
2019-10-12 09:45:55
92.188.124.228 attackspambots
Oct 11 08:52:25 kapalua sshd\[26432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228  user=root
Oct 11 08:52:27 kapalua sshd\[26432\]: Failed password for root from 92.188.124.228 port 36172 ssh2
Oct 11 08:56:14 kapalua sshd\[26769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228  user=root
Oct 11 08:56:16 kapalua sshd\[26769\]: Failed password for root from 92.188.124.228 port 53966 ssh2
Oct 11 09:00:08 kapalua sshd\[27129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.188.124.228  user=root
2019-10-12 10:06:44
207.248.35.86 attackbotsspam
Unauthorized connection attempt from IP address 207.248.35.86 on Port 445(SMB)
2019-10-12 09:53:06
211.65.63.181 attack
firewall-block, port(s): 1433/tcp
2019-10-12 09:41:46

Recently Reported IPs

227.229.2.178 253.2.172.132 78.75.211.7 117.193.156.123
218.216.180.137 245.243.223.110 55.220.50.217 248.150.103.187
248.150.103.243 248.150.103.192 230.45.114.160 242.54.244.209
223.151.249.111 179.61.248.71 104.144.210.142 41.112.169.248
209.127.75.58 175.215.130.25 36.110.217.134 115.192.223.171