Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.145.13.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.145.13.146.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:28:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 146.13.145.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.13.145.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.175.195 attackspambots
Invalid user test2 from 159.203.175.195 port 34170
2020-04-26 03:10:47
77.28.96.206 attackbots
TCP src-port=40663   dst-port=25   Listed on   abuseat-org barracuda zen-spamhaus       (Project Honey Pot rated Suspicious & Spammer)   (251)
2020-04-26 03:00:52
144.131.134.105 attackbotsspam
Apr 25 18:30:45 scw-6657dc sshd[27340]: Failed password for gnats from 144.131.134.105 port 41377 ssh2
Apr 25 18:30:45 scw-6657dc sshd[27340]: Failed password for gnats from 144.131.134.105 port 41377 ssh2
Apr 25 18:36:01 scw-6657dc sshd[27504]: Invalid user shimizu from 144.131.134.105 port 33290
...
2020-04-26 02:43:37
163.172.61.214 attackbots
leo_www
2020-04-26 02:52:10
45.119.41.54 attackspam
15 attempts against mh_ha-mag-login-ban on crop
2020-04-26 02:58:52
106.75.107.146 attackbots
sshd jail - ssh hack attempt
2020-04-26 03:02:54
222.186.15.62 attack
25.04.2020 18:59:16 SSH access blocked by firewall
2020-04-26 03:12:15
118.45.130.170 attackbotsspam
prod8
...
2020-04-26 03:13:33
18.179.26.40 attackspambots
Brute-force attempt banned
2020-04-26 02:48:23
45.143.223.98 attackbots
Brute forcing email accounts
2020-04-26 03:18:56
188.166.251.87 attackspambots
SSH Brute Force
2020-04-26 03:16:56
125.24.90.35 attackbotsspam
1587816722 - 04/25/2020 14:12:02 Host: 125.24.90.35/125.24.90.35 Port: 445 TCP Blocked
2020-04-26 02:44:41
111.93.200.50 attackbotsspam
2020-04-25T15:31:37.957123shield sshd\[26873\]: Invalid user djmax from 111.93.200.50 port 56296
2020-04-25T15:31:37.961829shield sshd\[26873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
2020-04-25T15:31:40.371890shield sshd\[26873\]: Failed password for invalid user djmax from 111.93.200.50 port 56296 ssh2
2020-04-25T15:41:02.010814shield sshd\[28531\]: Invalid user postfixpostfix from 111.93.200.50 port 39799
2020-04-25T15:41:02.015670shield sshd\[28531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
2020-04-26 02:47:52
198.108.67.33 attack
Apr 25 17:27:06 debian-2gb-nbg1-2 kernel: \[10087365.824883\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=26692 PROTO=TCP SPT=54871 DPT=10028 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-26 02:49:22
89.42.252.124 attack
$f2bV_matches
2020-04-26 02:52:59

Recently Reported IPs

58.246.66.106 222.254.4.66 59.47.38.71 213.32.105.175
189.213.231.137 91.188.247.212 101.0.54.178 177.55.57.69
187.167.185.217 200.35.2.177 39.128.220.173 115.234.16.83
27.220.85.156 166.88.232.67 5.105.224.103 111.21.13.9
51.81.155.78 112.10.113.31 84.52.71.67 39.148.156.100