Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.57.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.219.57.118.			IN	A

;; AUTHORITY SECTION:
.			270	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 13:40:31 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 118.57.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.57.219.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.36.81.169 attack
Rude login attack (16 tries in 1d)
2019-07-09 02:55:16
140.143.17.156 attackbots
Jul  8 11:29:37 server sshd[3917]: Failed password for git from 140.143.17.156 port 45850 ssh2
Jul  8 11:32:25 server sshd[4462]: Failed password for invalid user arkserver from 140.143.17.156 port 38242 ssh2
Jul  8 11:40:41 server sshd[6173]: Failed password for invalid user informix from 140.143.17.156 port 49248 ssh2
2019-07-09 02:35:09
218.92.0.172 attackspambots
Brute force SMTP login attempted.
...
2019-07-09 02:30:14
150.109.111.174 attack
HTTP/80/443 Probe, Hack -
2019-07-09 02:31:09
122.114.79.98 attack
Jul  8 14:49:40 debian sshd\[11748\]: Invalid user nostrant from 122.114.79.98 port 33324
Jul  8 14:49:40 debian sshd\[11748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.79.98
Jul  8 14:49:42 debian sshd\[11748\]: Failed password for invalid user nostrant from 122.114.79.98 port 33324 ssh2
...
2019-07-09 02:57:04
106.12.28.10 attackspam
Jul  8 17:39:32 apollo sshd\[18781\]: Invalid user nexus from 106.12.28.10Jul  8 17:39:34 apollo sshd\[18781\]: Failed password for invalid user nexus from 106.12.28.10 port 37412 ssh2Jul  8 17:46:26 apollo sshd\[18805\]: Failed password for root from 106.12.28.10 port 55948 ssh2
...
2019-07-09 02:45:39
183.187.240.202 attackbots
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-09 02:47:47
188.68.210.110 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-09 02:32:57
89.234.157.254 attackspambots
v+ssh-bruteforce
2019-07-09 02:26:56
141.98.10.33 attackspambots
Rude login attack (17 tries in 1d)
2019-07-09 02:58:37
152.32.98.174 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 07:28:57,781 INFO [amun_request_handler] PortScan Detected on Port: 445 (152.32.98.174)
2019-07-09 02:48:07
62.167.15.204 attackspam
Jul815:03:04server4dovecot:imap-login:Abortedlogin\(authfailed\,5attemptsin10secs\):user=\\,method=PLAIN\,rip=195.112.64.212\,lip=148.251.104.72\,TLS\,session=\Jul815:38:43server4dovecot:imap-login:Abortedlogin\(authfailed\,5attemptsin19secs\):user=\\,method=PLAIN\,rip=195.112.64.212\,lip=148.251.104.72\,TLS\,session=\<9zPljiuNU LDcEDU\>Jul815:48:55server4dovecot:imap-login:Abortedlogin\(authfailed\,5attemptsin22secs\):user=\\,method=PLAIN\,rip=62.167.15.204\,lip=148.251.104.72\,TLS\,session=\Jul815:43:45server4dovecot:imap-login:Abortedlogin\(authfailed\,5attemptsin22secs\):user=\\,method=PLAIN\,rip=195.112.64.212\,lip=148.251.104.72\,TLS\,session=\Jul815:37:33server4dovecot:imap-login:Abortedlogin\(authfailed\,5attemptsin24secs\):user=\\,method=PLAIN\,rip=195.112.64.212\,lip=148.251.1
2019-07-09 02:46:31
211.13.204.1 attackspambots
C1,DEF GET /store/wp-includes/wlwmanifest.xml
2019-07-09 02:29:03
147.135.207.246 attackbotsspam
Brute forcing Wordpress login
2019-07-09 02:58:03
217.61.2.97 attackspambots
Jul  8 21:04:46 MainVPS sshd[9704]: Invalid user mailtest from 217.61.2.97 port 36720
Jul  8 21:04:46 MainVPS sshd[9704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.2.97
Jul  8 21:04:46 MainVPS sshd[9704]: Invalid user mailtest from 217.61.2.97 port 36720
Jul  8 21:04:48 MainVPS sshd[9704]: Failed password for invalid user mailtest from 217.61.2.97 port 36720 ssh2
Jul  8 21:06:34 MainVPS sshd[9876]: Invalid user user from 217.61.2.97 port 46913
...
2019-07-09 03:06:46

Recently Reported IPs

95.164.233.103 80.66.81.40 213.166.79.127 180.76.236.230
180.76.236.140 23.108.78.174 180.76.236.190 180.76.237.28
23.108.75.171 104.227.1.138 45.153.22.57 45.170.13.128
104.144.99.2 193.8.1.88 93.177.117.225 198.154.92.170
5.157.131.101 180.76.241.141 154.30.184.193 180.76.242.133