Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.151.145.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.151.145.213.		IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 02:18:13 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 213.145.151.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.145.151.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.175.99.237 attackspam
Oct  6 16:56:55 vm1 sshd[6798]: Failed password for root from 134.175.99.237 port 34908 ssh2
...
2020-10-06 23:38:03
182.254.134.77 attack
$f2bV_matches
2020-10-07 00:06:25
222.186.30.76 attackbots
Oct  6 12:38:36 vm2 sshd[12578]: Failed password for root from 222.186.30.76 port 40848 ssh2
Oct  6 17:33:23 vm2 sshd[5350]: Failed password for root from 222.186.30.76 port 25478 ssh2
...
2020-10-06 23:36:58
59.51.65.17 attack
59.51.65.17 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  6 09:35:48 jbs1 sshd[30632]: Failed password for root from 122.51.154.136 port 37168 ssh2
Oct  6 09:35:29 jbs1 sshd[30586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.51.65.17  user=root
Oct  6 09:35:30 jbs1 sshd[30586]: Failed password for root from 59.51.65.17 port 45972 ssh2
Oct  6 09:35:46 jbs1 sshd[30632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.154.136  user=root
Oct  6 09:41:57 jbs1 sshd[32600]: Failed password for root from 159.203.188.175 port 33722 ssh2
Oct  6 09:40:17 jbs1 sshd[32107]: Failed password for root from 118.27.5.46 port 33712 ssh2

IP Addresses Blocked:

122.51.154.136 (CN/China/-)
2020-10-06 23:47:11
67.79.13.65 attackspambots
$f2bV_matches
2020-10-07 00:01:55
122.51.186.86 attack
(sshd) Failed SSH login from 122.51.186.86 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 09:49:24 server sshd[4805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.86  user=root
Oct  6 09:49:26 server sshd[4805]: Failed password for root from 122.51.186.86 port 42920 ssh2
Oct  6 10:05:26 server sshd[8746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.86  user=root
Oct  6 10:05:28 server sshd[8746]: Failed password for root from 122.51.186.86 port 42444 ssh2
Oct  6 10:07:40 server sshd[9392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.186.86  user=root
2020-10-06 23:46:20
120.92.107.174 attackbotsspam
Bruteforce detected by fail2ban
2020-10-07 00:08:20
211.252.86.82 attackspambots
2020-10-06T22:29:02.978911hostname sshd[16877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.86.82  user=root
2020-10-06T22:29:05.066593hostname sshd[16877]: Failed password for root from 211.252.86.82 port 57998 ssh2
...
2020-10-07 00:21:44
191.238.220.140 attackspam
191.238.220.140 (BR/Brazil/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  6 11:45:37 server4 sshd[3329]: Failed password for root from 191.238.220.140 port 45038 ssh2
Oct  6 11:48:19 server4 sshd[4999]: Failed password for root from 51.210.109.128 port 57042 ssh2
Oct  6 11:48:50 server4 sshd[5137]: Failed password for root from 187.188.34.221 port 52604 ssh2
Oct  6 11:45:34 server4 sshd[3329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.238.220.140  user=root
Oct  6 11:45:17 server4 sshd[3234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.86.187  user=root
Oct  6 11:45:19 server4 sshd[3234]: Failed password for root from 119.29.86.187 port 53212 ssh2

IP Addresses Blocked:
2020-10-06 23:52:30
221.3.33.40 attackbotsspam
Honeypot hit.
2020-10-07 00:00:52
51.79.156.248 attack
SSH login attempts.
2020-10-06 23:44:28
164.132.145.70 attackbots
Oct  6 12:29:09 ws19vmsma01 sshd[216948]: Failed password for root from 164.132.145.70 port 49040 ssh2
...
2020-10-07 00:04:44
139.219.11.254 attack
Oct  6 10:40:55 mail sshd[6207]: Failed password for root from 139.219.11.254 port 56568 ssh2
...
2020-10-06 23:48:20
134.101.138.47 attack
Oct  5 22:38:37 alaska sshd[29486]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:43 alaska sshd[29496]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:48 alaska sshd[29506]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:53 alaska sshd[29527]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:59 alaska sshd[29537]: refused connect from 134.101.138.47 (134.101.138.47)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.101.138.47
2020-10-06 23:57:19
98.214.86.3 attack
Port scan on 1 port(s): 22
2020-10-06 23:59:20

Recently Reported IPs

14.173.196.240 125.133.60.129 255.128.220.192 59.1.231.229
219.185.79.150 96.34.6.84 23.84.19.245 9.81.55.167
64.232.91.60 183.111.161.88 129.14.131.187 14.38.147.34
115.46.109.119 71.122.113.188 98.7.96.141 72.14.223.120
93.28.2.39 40.30.0.108 37.88.12.36 58.176.177.170