Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gangnam-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.145.182.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.145.182.64.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 08:12:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 64.182.145.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.182.145.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.163.104.152 attackspambots
Automatic report - XMLRPC Attack
2020-02-08 04:48:25
148.70.218.43 attack
Automatic report - SSH Brute-Force Attack
2020-02-08 04:44:18
103.91.180.201 attack
Lines containing failures of 103.91.180.201


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.91.180.201
2020-02-08 04:30:26
189.58.90.67 attack
Unauthorized connection attempt from IP address 189.58.90.67 on Port 445(SMB)
2020-02-08 04:28:41
188.247.79.142 attackspambots
Feb 7 15:15:06 *host* sshd\[30886\]: Invalid user admin from 188.247.79.142 port 60017 ...
2020-02-08 04:13:07
103.235.254.235 attackspambots
firewall-block, port(s): 1433/tcp
2020-02-08 04:40:28
125.212.157.102 attack
Lines containing failures of 125.212.157.102


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.212.157.102
2020-02-08 04:44:47
162.14.10.212 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:25:10
162.14.10.0 attackspam
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:34:31
187.204.64.63 attackbotsspam
Unauthorized connection attempt from IP address 187.204.64.63 on Port 445(SMB)
2020-02-08 04:40:53
35.223.232.117 attackspam
Port 22 Scan, PTR: None
2020-02-08 04:29:27
176.99.73.32 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-02-08 04:36:22
51.68.44.13 attackbotsspam
Feb  7 18:51:49 v22018076622670303 sshd\[3963\]: Invalid user msw from 51.68.44.13 port 37102
Feb  7 18:51:49 v22018076622670303 sshd\[3963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13
Feb  7 18:51:51 v22018076622670303 sshd\[3963\]: Failed password for invalid user msw from 51.68.44.13 port 37102 ssh2
...
2020-02-08 04:50:40
161.202.18.11 attack
ICMP MH Probe, Scan /Distributed -
2020-02-08 04:53:43
148.255.97.35 attackbots
fraudulent SSH attempt
2020-02-08 04:53:59

Recently Reported IPs

54.214.209.118 209.137.107.176 128.178.203.119 223.46.28.107
79.82.162.105 90.217.68.21 128.234.252.201 245.172.54.42
130.90.20.196 180.78.196.36 129.199.17.250 218.14.112.94
155.156.30.30 86.250.36.251 22.234.129.132 27.178.21.150
200.14.156.137 220.233.180.248 197.187.198.193 39.169.134.205