Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.130.123.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.130.123.18.			IN	A

;; AUTHORITY SECTION:
.			470	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120801 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 13:11:11 CST 2019
;; MSG SIZE  rcvd: 118
Host info
18.123.130.108.in-addr.arpa domain name pointer ec2-108-130-123-18.eu-west-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.123.130.108.in-addr.arpa	name = ec2-108-130-123-18.eu-west-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.203.96.120 attack
Unauthorized connection attempt from IP address 104.203.96.120 on Port 445(SMB)
2019-07-31 23:57:46
85.119.11.146 attackspambots
:
2019-08-01 00:21:42
187.87.13.50 attack
failed_logins
2019-08-01 00:47:14
71.66.168.146 attackbotsspam
Invalid user xmpp from 71.66.168.146 port 7722
2019-08-01 00:42:13
222.186.52.123 attackspambots
2019-07-24T11:06:45.128Z CLOSE host=222.186.52.123 port=43815 fd=4 time=107.395 bytes=18246
...
2019-07-31 23:41:43
82.165.197.136 normal
test
2019-08-01 00:08:11
104.237.255.204 attack
Jul 31 13:13:13 Ubuntu-1404-trusty-64-minimal sshd\[25799\]: Invalid user bank from 104.237.255.204
Jul 31 13:13:13 Ubuntu-1404-trusty-64-minimal sshd\[25799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.237.255.204
Jul 31 13:13:15 Ubuntu-1404-trusty-64-minimal sshd\[25799\]: Failed password for invalid user bank from 104.237.255.204 port 32794 ssh2
Jul 31 13:20:24 Ubuntu-1404-trusty-64-minimal sshd\[30487\]: Invalid user ellen from 104.237.255.204
Jul 31 13:20:24 Ubuntu-1404-trusty-64-minimal sshd\[30487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.237.255.204
2019-08-01 00:16:46
177.69.130.81 attackbotsspam
Invalid user uftp from 177.69.130.81 port 60694
2019-08-01 00:33:10
180.182.47.132 attack
ssh failed login
2019-07-31 23:56:09
122.70.153.225 attackbotsspam
Invalid user nx from 122.70.153.225 port 48126
2019-08-01 00:54:42
166.111.80.44 attackbots
Jul 31 14:40:00 minden010 sshd[1019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44
Jul 31 14:40:02 minden010 sshd[1019]: Failed password for invalid user tyrell from 166.111.80.44 port 34484 ssh2
Jul 31 14:43:36 minden010 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44
...
2019-08-01 00:08:00
222.72.138.208 attackbots
2019-07-31T10:14:09.065532Z 304535cd902c New connection: 222.72.138.208:48701 (172.17.0.3:2222) [session: 304535cd902c]
2019-07-31T10:27:25.216666Z 68b7a57209ad New connection: 222.72.138.208:13281 (172.17.0.3:2222) [session: 68b7a57209ad]
2019-08-01 00:43:24
43.239.176.113 attackspam
Jul 31 10:03:40 nextcloud sshd\[1610\]: Invalid user gary from 43.239.176.113
Jul 31 10:03:40 nextcloud sshd\[1610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113
Jul 31 10:03:42 nextcloud sshd\[1610\]: Failed password for invalid user gary from 43.239.176.113 port 63590 ssh2
...
2019-07-31 23:38:57
163.172.190.185 attackbots
Jul 31 17:57:33 MK-Soft-Root1 sshd\[1565\]: Invalid user hub from 163.172.190.185 port 41610
Jul 31 17:57:33 MK-Soft-Root1 sshd\[1565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.190.185
Jul 31 17:57:35 MK-Soft-Root1 sshd\[1565\]: Failed password for invalid user hub from 163.172.190.185 port 41610 ssh2
...
2019-08-01 00:51:43
182.72.124.6 attack
Invalid user odoo from 182.72.124.6 port 47496
2019-08-01 00:48:01

Recently Reported IPs

89.220.222.24 46.4.89.144 51.195.39.109 202.205.221.69
249.97.88.187 91.230.165.124 211.19.96.167 250.68.41.56
239.136.23.148 99.206.234.215 102.63.111.232 232.23.81.125
228.125.241.111 131.31.34.11 94.78.145.40 166.21.46.232
224.212.147.192 190.165.198.102 196.52.84.43 187.35.75.49