Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gangseo-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.39.1.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.39.1.158.			IN	A

;; AUTHORITY SECTION:
.			460	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:10:30 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 158.1.39.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.1.39.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.200.113.222 attackbots
Unauthorized connection attempt from IP address 91.200.113.222 on Port 445(SMB)
2020-04-25 05:52:31
177.38.20.176 attackspam
Port probing on unauthorized port 88
2020-04-25 06:14:16
118.69.176.26 attackbots
SSH Invalid Login
2020-04-25 06:01:00
40.90.160.83 attack
Apr 24 23:07:22 m3061 sshd[6454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.90.160.83  user=r.r
Apr 24 23:07:24 m3061 sshd[6454]: Failed password for r.r from 40.90.160.83 port 48046 ssh2
Apr 24 23:07:24 m3061 sshd[6454]: Received disconnect from 40.90.160.83: 11: Normal Shutdown, Thank you for playing [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=40.90.160.83
2020-04-25 06:16:05
59.61.83.118 attackbots
Apr 24 22:51:59 h2779839 sshd[5430]: Invalid user yusuf from 59.61.83.118 port 35530
Apr 24 22:51:59 h2779839 sshd[5430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.61.83.118
Apr 24 22:51:59 h2779839 sshd[5430]: Invalid user yusuf from 59.61.83.118 port 35530
Apr 24 22:52:01 h2779839 sshd[5430]: Failed password for invalid user yusuf from 59.61.83.118 port 35530 ssh2
Apr 24 22:52:53 h2779839 sshd[5437]: Invalid user doostie from 59.61.83.118 port 47646
Apr 24 22:52:53 h2779839 sshd[5437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.61.83.118
Apr 24 22:52:53 h2779839 sshd[5437]: Invalid user doostie from 59.61.83.118 port 47646
Apr 24 22:52:55 h2779839 sshd[5437]: Failed password for invalid user doostie from 59.61.83.118 port 47646 ssh2
Apr 24 22:53:48 h2779839 sshd[5447]: Invalid user andrey from 59.61.83.118 port 59760
...
2020-04-25 05:59:27
14.18.101.211 attackbots
Apr 24 21:34:29 ip-172-31-62-245 sshd\[3092\]: Invalid user oracle from 14.18.101.211\
Apr 24 21:34:31 ip-172-31-62-245 sshd\[3092\]: Failed password for invalid user oracle from 14.18.101.211 port 51698 ssh2\
Apr 24 21:38:22 ip-172-31-62-245 sshd\[3194\]: Invalid user mt from 14.18.101.211\
Apr 24 21:38:24 ip-172-31-62-245 sshd\[3194\]: Failed password for invalid user mt from 14.18.101.211 port 49550 ssh2\
Apr 24 21:41:59 ip-172-31-62-245 sshd\[3357\]: Invalid user eli from 14.18.101.211\
2020-04-25 05:58:13
45.148.10.68 attackspambots
Automatic report - Brute Force attack using this IP address
2020-04-25 05:53:32
51.15.118.15 attackbots
Invalid user sk from 51.15.118.15 port 56742
2020-04-25 06:04:54
80.255.130.197 attackbots
Invalid user docker from 80.255.130.197 port 48953
2020-04-25 06:14:52
218.92.0.145 attackbotsspam
[MK-Root1] SSH login failed
2020-04-25 05:45:35
91.200.126.90 attackspam
firewall-block, port(s): 445/tcp
2020-04-25 05:41:56
222.186.31.83 attack
Apr 25 02:46:31 gw1 sshd[20198]: Failed password for root from 222.186.31.83 port 40068 ssh2
...
2020-04-25 05:49:48
138.68.81.162 attack
SSH Invalid Login
2020-04-25 05:51:10
122.51.234.16 attackspambots
SSH Invalid Login
2020-04-25 06:02:45
202.124.193.215 attack
Invalid user hq from 202.124.193.215 port 40684
2020-04-25 06:12:10

Recently Reported IPs

76.3.41.206 146.5.208.21 139.140.238.194 87.37.74.42
27.255.25.52 248.196.56.93 190.251.47.224 191.235.15.86
175.93.196.1 32.80.129.144 175.176.4.154 125.189.38.75
218.141.76.92 92.170.210.72 47.5.88.55 245.230.140.119
10.124.117.215 159.203.5.46 165.68.96.2 238.139.24.192