Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.195.130.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.195.130.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 18:41:13 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 18.130.195.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.130.195.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.62.33.222 attackbotsspam
178.62.33.222 - - [30/Sep/2020:18:13:24 +0100] "POST /wp-login.php HTTP/1.1" 200 2545 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.33.222 - - [30/Sep/2020:18:13:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2520 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.33.222 - - [30/Sep/2020:18:13:37 +0100] "POST /wp-login.php HTTP/1.1" 200 2520 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 08:57:55
58.56.140.62 attackbots
Invalid user dick from 58.56.140.62 port 51233
2020-10-01 08:48:52
93.58.128.28 attack
Automatic report - Banned IP Access
2020-10-01 08:46:24
85.26.209.203 attack
Dovecot Invalid User Login Attempt.
2020-10-01 09:15:46
2a0c:b200:f002:829:35d9:29f8:e1fe:20bf attackspam
1 attempts against mh-modsecurity-ban on drop
2020-10-01 08:47:29
182.121.211.114 attack
Automatic report - Port Scan Attack
2020-10-01 08:42:03
49.235.11.137 attack
(sshd) Failed SSH login from 49.235.11.137 (CN/China/-): 5 in the last 3600 secs
2020-10-01 09:15:07
193.28.36.18 attackspambots
Port Scan: TCP/443
2020-10-01 08:52:31
94.153.224.202 attackspam
2020-09-30T15:09:13.986535727Z wordpress(ufrj.br): Blocked username authentication attempt for [login] from 94.153.224.202
...
2020-10-01 09:05:29
129.211.10.111 attack
2020-10-01T00:26:06.932149snf-827550 sshd[26486]: Invalid user cent from 129.211.10.111 port 50452
2020-10-01T00:26:08.888694snf-827550 sshd[26486]: Failed password for invalid user cent from 129.211.10.111 port 50452 ssh2
2020-10-01T00:33:59.221457snf-827550 sshd[26572]: Invalid user backuppc from 129.211.10.111 port 53440
...
2020-10-01 08:45:01
122.51.163.237 attackbots
Invalid user idc from 122.51.163.237 port 39268
2020-10-01 08:52:00
74.120.14.49 attackbotsspam
Sep 30 17:54:00 propaganda sshd[9937]: Connection from 74.120.14.49 port 38832 on 10.0.0.161 port 22 rdomain ""
Sep 30 17:54:00 propaganda sshd[9937]: Unable to negotiate with 74.120.14.49 port 38832: no matching MAC found. Their offer: hmac-sha2-256,hmac-sha1,hmac-sha1-96 [preauth]
2020-10-01 09:07:47
51.91.77.103 attack
SSH-BruteForce
2020-10-01 09:05:45
116.3.200.164 attack
SSH Invalid Login
2020-10-01 08:58:14
45.185.17.216 attackspambots
Automatic report - Banned IP Access
2020-10-01 09:13:30

Recently Reported IPs

20.145.229.45 247.75.126.168 214.86.202.29 253.167.169.254
254.182.216.248 177.170.246.238 31.186.161.74 133.189.28.104
59.58.25.185 152.124.24.2 220.161.59.65 125.177.47.26
252.153.44.161 155.8.103.113 72.35.115.230 89.58.133.68
217.15.191.201 78.9.188.240 147.130.20.121 215.43.182.123