Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.1.142.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30995
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.1.142.159.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091600 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 21:26:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 159.142.1.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.142.1.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.136.130.209 attackbots
ssh brute force
2019-11-25 18:11:40
58.144.150.232 attack
Nov 25 11:11:04 * sshd[2136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.150.232
Nov 25 11:11:06 * sshd[2136]: Failed password for invalid user delois from 58.144.150.232 port 49280 ssh2
2019-11-25 18:23:58
51.68.230.54 attack
Nov 25 10:39:24 mail sshd[7773]: Invalid user phion from 51.68.230.54
...
2019-11-25 18:20:13
106.13.1.100 attackbots
Automatic report - Banned IP Access
2019-11-25 18:38:40
23.251.128.200 attack
F2B jail: sshd. Time: 2019-11-25 11:34:14, Reported by: VKReport
2019-11-25 18:42:34
173.212.252.245 attack
...
2019-11-25 18:30:33
157.245.107.153 attackspambots
Nov 25 10:09:50 web8 sshd\[15593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.153  user=bin
Nov 25 10:09:52 web8 sshd\[15593\]: Failed password for bin from 157.245.107.153 port 33252 ssh2
Nov 25 10:17:11 web8 sshd\[19213\]: Invalid user kam from 157.245.107.153
Nov 25 10:17:11 web8 sshd\[19213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.153
Nov 25 10:17:13 web8 sshd\[19213\]: Failed password for invalid user kam from 157.245.107.153 port 41648 ssh2
2019-11-25 18:23:45
41.82.208.182 attack
Nov 25 07:25:41 serwer sshd\[30478\]: Invalid user xuan from 41.82.208.182 port 13502
Nov 25 07:25:41 serwer sshd\[30478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182
Nov 25 07:25:42 serwer sshd\[30478\]: Failed password for invalid user xuan from 41.82.208.182 port 13502 ssh2
...
2019-11-25 18:19:39
167.71.215.72 attackbots
Nov 25 09:54:06 web8 sshd\[8163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72  user=mysql
Nov 25 09:54:09 web8 sshd\[8163\]: Failed password for mysql from 167.71.215.72 port 10358 ssh2
Nov 25 09:57:47 web8 sshd\[9988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72  user=mysql
Nov 25 09:57:49 web8 sshd\[9988\]: Failed password for mysql from 167.71.215.72 port 25985 ssh2
Nov 25 10:01:29 web8 sshd\[11737\]: Invalid user tangene from 167.71.215.72
2019-11-25 18:12:48
91.232.196.249 attackbots
Nov 24 20:59:05 hpm sshd\[8547\]: Invalid user subst from 91.232.196.249
Nov 24 20:59:05 hpm sshd\[8547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.196.249
Nov 24 20:59:07 hpm sshd\[8547\]: Failed password for invalid user subst from 91.232.196.249 port 57502 ssh2
Nov 24 21:05:50 hpm sshd\[9101\]: Invalid user P2012DEV from 91.232.196.249
Nov 24 21:05:50 hpm sshd\[9101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.232.196.249
2019-11-25 18:17:50
134.209.237.55 attack
Nov 25 10:16:20 root sshd[1986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.55 
Nov 25 10:16:22 root sshd[1986]: Failed password for invalid user avellaneda from 134.209.237.55 port 60478 ssh2
Nov 25 10:19:44 root sshd[2034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.55 
...
2019-11-25 18:29:25
182.61.132.165 attack
Nov 25 15:09:44 itv-usvr-01 sshd[2833]: Invalid user miquela from 182.61.132.165
2019-11-25 18:23:29
40.123.36.193 attackbots
11/25/2019-04:50:46.402010 40.123.36.193 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 18:14:50
140.143.15.169 attack
$f2bV_matches
2019-11-25 18:29:08
222.92.139.158 attackbots
Nov 25 11:11:03 dedicated sshd[13564]: Invalid user ledroit from 222.92.139.158 port 59108
2019-11-25 18:26:48

Recently Reported IPs

38.15.148.195 120.24.63.72 187.27.202.123 193.200.116.76
36.66.63.135 60.168.207.208 189.47.77.135 140.255.75.141
79.225.72.86 171.38.222.60 221.239.151.199 183.102.246.8
35.242.154.98 91.53.57.188 194.31.162.55 45.159.23.106
95.181.150.72 138.36.12.6 71.172.57.12 149.18.30.162