Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western Hong Kong Island

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.218.119.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.218.119.2.			IN	A

;; AUTHORITY SECTION:
.			573	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022120600 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 06 21:00:33 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 2.119.218.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.119.218.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.234.24.108 attack
20 attempts against mh-ssh on cloud.magehost.pro
2019-12-07 01:26:57
106.13.45.131 attackspam
Dec  6 18:13:16 vps691689 sshd[17537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131
Dec  6 18:13:18 vps691689 sshd[17537]: Failed password for invalid user fieldsup from 106.13.45.131 port 53590 ssh2
...
2019-12-07 01:25:02
158.69.222.2 attack
Dec  6 18:11:56 vps691689 sshd[17501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
Dec  6 18:11:57 vps691689 sshd[17501]: Failed password for invalid user 123Circus from 158.69.222.2 port 45701 ssh2
Dec  6 18:17:24 vps691689 sshd[17635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2
...
2019-12-07 01:19:58
45.125.66.186 attack
Dec  6 10:07:36 web1 postfix/smtpd[19411]: warning: unknown[45.125.66.186]: SASL LOGIN authentication failed: authentication failure
...
2019-12-07 01:50:00
140.249.22.238 attackspambots
2019-12-06T17:02:22.928805abusebot-2.cloudsearch.cf sshd\[7559\]: Invalid user alford from 140.249.22.238 port 54340
2019-12-07 01:31:59
165.22.148.76 attackbotsspam
2019-12-06T17:06:06.068017abusebot.cloudsearch.cf sshd\[11804\]: Invalid user kierramona from 165.22.148.76 port 52688
2019-12-07 01:19:17
190.113.157.155 attackbots
2019-12-06T17:20:45.632149abusebot-4.cloudsearch.cf sshd\[26758\]: Invalid user caleb from 190.113.157.155 port 57016
2019-12-07 01:30:31
5.53.181.49 attack
Unauthorised access (Dec  6) SRC=5.53.181.49 LEN=40 TTL=241 ID=58461 TCP DPT=1433 WINDOW=1024 SYN
2019-12-07 01:38:30
84.196.70.84 attackspam
Dec  6 18:00:01 MK-Soft-VM5 sshd[453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.196.70.84 
Dec  6 18:00:03 MK-Soft-VM5 sshd[453]: Failed password for invalid user 1234 from 84.196.70.84 port 46424 ssh2
...
2019-12-07 01:18:34
173.249.2.122 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-12-07 01:14:15
192.81.211.152 attack
Dec  6 07:31:39 web1 sshd\[6775\]: Invalid user tharaldsen from 192.81.211.152
Dec  6 07:31:39 web1 sshd\[6775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.211.152
Dec  6 07:31:42 web1 sshd\[6775\]: Failed password for invalid user tharaldsen from 192.81.211.152 port 51246 ssh2
Dec  6 07:37:04 web1 sshd\[7380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.211.152  user=root
Dec  6 07:37:06 web1 sshd\[7380\]: Failed password for root from 192.81.211.152 port 34096 ssh2
2019-12-07 01:39:39
141.98.10.71 attackspambots
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.71\]: 535 Incorrect authentication data \(set_id=root1@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.71\]: 535 Incorrect authentication data \(set_id=root1@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[141.98.10.71\]: 535 Incorrect authentication data \(set_id=root1@**REMOVED**.**REMOVED**\)
2019-12-07 01:52:52
114.116.109.122 attack
Automatic report generated by Wazuh
2019-12-07 01:49:28
123.206.88.24 attackbotsspam
Dec  6 14:48:39 venus sshd\[20857\]: Invalid user dorgan from 123.206.88.24 port 41654
Dec  6 14:48:39 venus sshd\[20857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.88.24
Dec  6 14:48:41 venus sshd\[20857\]: Failed password for invalid user dorgan from 123.206.88.24 port 41654 ssh2
...
2019-12-07 01:53:29
198.211.118.157 attackspambots
$f2bV_matches
2019-12-07 01:21:29

Recently Reported IPs

8.218.139.168 8.210.222.105 114.80.36.60 220.132.169.174
26.125.86.8 105.251.131.34 122.188.51.189 157.255.174.253
200.49.14.165 116.129.253.198 61.0.38.93 217.51.103.12
165.48.253.204 80.173.73.228 232.197.32.40 25.48.33.164
191.14.129.25 112.166.225.226 243.246.144.173 66.15.222.220