Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.18.185.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.18.185.234.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:30:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 234.185.18.129.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.185.18.129.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.192.219.106 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-10-29 23:21:53
51.75.207.61 attackspam
2019-10-29T15:24:41.579102abusebot.cloudsearch.cf sshd\[2199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.ip-51-75-207.eu  user=root
2019-10-29 23:31:27
167.71.220.84 attackspambots
Oct 29 13:38:16 vps691689 sshd[20961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.220.84
Oct 29 13:38:18 vps691689 sshd[20961]: Failed password for invalid user Password@963 from 167.71.220.84 port 43548 ssh2
...
2019-10-29 23:04:21
98.143.227.144 attackbotsspam
SSH brutforce
2019-10-29 22:57:24
46.90.94.197 attack
Port Scan
2019-10-29 23:00:45
51.75.248.127 attackspambots
Oct 29 13:11:49 SilenceServices sshd[15574]: Failed password for root from 51.75.248.127 port 52016 ssh2
Oct 29 13:15:32 SilenceServices sshd[16608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.248.127
Oct 29 13:15:34 SilenceServices sshd[16608]: Failed password for invalid user umountsys from 51.75.248.127 port 34904 ssh2
2019-10-29 23:21:27
51.68.251.201 attackbotsspam
Oct 29 15:08:20 vpn01 sshd[22722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.251.201
Oct 29 15:08:22 vpn01 sshd[22722]: Failed password for invalid user hca from 51.68.251.201 port 58472 ssh2
...
2019-10-29 23:20:18
45.70.164.242 attack
Unauthorised access (Oct 29) SRC=45.70.164.242 LEN=52 TTL=119 ID=6825 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-29 22:46:25
206.189.165.94 attackbotsspam
$f2bV_matches
2019-10-29 22:45:39
74.220.215.69 attackspambots
SQL Injection Attempts
2019-10-29 23:13:50
60.209.169.44 attackspam
Telnet Server BruteForce Attack
2019-10-29 23:04:46
113.172.11.188 attackspam
SASL Brute Force
2019-10-29 23:09:34
107.170.113.190 attackspam
ssh brute force
2019-10-29 23:04:59
117.50.104.206 attackbotsspam
Port Scan
2019-10-29 22:48:07
107.179.7.158 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-29 22:59:06

Recently Reported IPs

121.196.48.109 222.140.173.74 179.124.30.236 182.240.105.91
175.156.111.27 197.8.231.140 222.165.205.125 152.136.255.177
92.49.178.238 77.236.237.241 102.159.7.60 183.227.118.120
201.150.180.204 89.251.147.97 176.99.232.71 159.65.220.252
137.59.240.73 211.233.68.2 213.207.228.162 128.74.124.132