Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.134.213.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52066
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.134.213.20.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 08:38:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
20.213.134.218.in-addr.arpa domain name pointer softbank218134213020.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.213.134.218.in-addr.arpa	name = softbank218134213020.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.244.179.6 attackspam
Dec 15 10:52:45 home sshd[950]: Invalid user nextcloud from 80.244.179.6 port 40970
Dec 15 10:52:45 home sshd[950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
Dec 15 10:52:45 home sshd[950]: Invalid user nextcloud from 80.244.179.6 port 40970
Dec 15 10:52:47 home sshd[950]: Failed password for invalid user nextcloud from 80.244.179.6 port 40970 ssh2
Dec 15 10:58:45 home sshd[1009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6  user=root
Dec 15 10:58:47 home sshd[1009]: Failed password for root from 80.244.179.6 port 33268 ssh2
Dec 15 11:05:39 home sshd[1064]: Invalid user pmc from 80.244.179.6 port 38482
Dec 15 11:05:39 home sshd[1064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
Dec 15 11:05:39 home sshd[1064]: Invalid user pmc from 80.244.179.6 port 38482
Dec 15 11:05:41 home sshd[1064]: Failed password for invalid user pmc from 80.244.179
2019-12-16 05:52:06
220.121.97.43 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-12-16 05:49:33
51.158.189.0 attackbots
2019-12-15T22:07:27.435125stark.klein-stark.info sshd\[8731\]: Invalid user ozmore from 51.158.189.0 port 46890
2019-12-15T22:07:27.442749stark.klein-stark.info sshd\[8731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.189.0
2019-12-15T22:07:29.019965stark.klein-stark.info sshd\[8731\]: Failed password for invalid user ozmore from 51.158.189.0 port 46890 ssh2
...
2019-12-16 05:24:03
122.49.216.108 attack
Dec 15 22:14:07 mail postfix/smtpd[18240]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 15 22:14:35 mail postfix/smtpd[20541]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 15 22:14:52 mail postfix/smtpd[20541]: warning: unknown[122.49.216.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-16 05:47:33
197.156.132.172 attackspam
Dec 15 22:19:05 webhost01 sshd[30307]: Failed password for root from 197.156.132.172 port 61674 ssh2
Dec 15 22:27:20 webhost01 sshd[30450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.132.172
...
2019-12-16 05:38:33
157.55.39.236 attackspambots
Automatic report - Banned IP Access
2019-12-16 05:53:39
184.105.247.194 attackspam
Unauthorized connection attempt detected from IP address 184.105.247.194 to port 2323
2019-12-16 05:50:24
125.213.150.6 attackspambots
2019-12-15T14:40:06.993300abusebot-6.cloudsearch.cf sshd\[21567\]: Invalid user trib from 125.213.150.6 port 34202
2019-12-15T14:40:06.999282abusebot-6.cloudsearch.cf sshd\[21567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6
2019-12-15T14:40:08.659559abusebot-6.cloudsearch.cf sshd\[21567\]: Failed password for invalid user trib from 125.213.150.6 port 34202 ssh2
2019-12-15T14:46:42.714731abusebot-6.cloudsearch.cf sshd\[21602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6  user=root
2019-12-16 05:27:13
102.133.236.34 attackspambots
RDP Bruteforce
2019-12-16 05:59:42
46.21.111.93 attackspambots
Dec 15 19:09:09 server sshd\[14338\]: Invalid user backup from 46.21.111.93
Dec 15 19:09:09 server sshd\[14338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.21.111.93 
Dec 15 19:09:11 server sshd\[14338\]: Failed password for invalid user backup from 46.21.111.93 port 57618 ssh2
Dec 15 19:18:05 server sshd\[17138\]: Invalid user info from 46.21.111.93
Dec 15 19:18:05 server sshd\[17138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.21.111.93 
...
2019-12-16 05:34:28
106.53.66.103 attackbotsspam
SSH Brute Force
2019-12-16 05:40:34
103.22.250.234 attackbotsspam
Unauthorized connection attempt from IP address 103.22.250.234 on Port 445(SMB)
2019-12-16 05:28:01
37.187.248.39 attack
Dec 15 23:49:01 hosting sshd[21744]: Invalid user kunkun from 37.187.248.39 port 39472
Dec 15 23:49:01 hosting sshd[21744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330057.ip-37-187-248.eu
Dec 15 23:49:01 hosting sshd[21744]: Invalid user kunkun from 37.187.248.39 port 39472
Dec 15 23:49:03 hosting sshd[21744]: Failed password for invalid user kunkun from 37.187.248.39 port 39472 ssh2
Dec 15 23:56:38 hosting sshd[22507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330057.ip-37-187-248.eu  user=root
Dec 15 23:56:40 hosting sshd[22507]: Failed password for root from 37.187.248.39 port 54868 ssh2
...
2019-12-16 05:30:27
36.71.233.46 attack
Unauthorized connection attempt from IP address 36.71.233.46 on Port 445(SMB)
2019-12-16 05:45:41
138.197.73.215 attackspam
Dec 15 18:13:36 mail sshd[21503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.73.215 
Dec 15 18:13:38 mail sshd[21503]: Failed password for invalid user ale from 138.197.73.215 port 45528 ssh2
Dec 15 18:19:09 mail sshd[23711]: Failed password for uucp from 138.197.73.215 port 53912 ssh2
2019-12-16 05:47:07

Recently Reported IPs

0.10.16.46 54.185.83.77 18.15.249.196 222.73.129.95
35.56.207.89 242.26.62.77 203.12.28.73 3.222.165.219
9.189.27.95 80.147.79.110 96.154.46.185 137.110.164.7
162.71.17.28 60.74.141.46 51.73.17.245 120.15.228.159
237.81.12.24 108.233.196.135 157.92.50.63 49.68.120.90