Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.134.197.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.134.197.18.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030901 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 08:38:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 18.197.134.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.197.134.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.178.78.153 attackbotsspam
[Fri May 29 20:16:15 2020] - DDoS Attack From IP: 51.178.78.153 Port: 32783
2020-05-29 21:50:13
159.65.174.81 attackspam
Port Scan
2020-05-29 21:43:33
185.220.100.255 attack
May 29 13:28:35 scw-6657dc sshd[15243]: Failed password for root from 185.220.100.255 port 14010 ssh2
May 29 13:28:35 scw-6657dc sshd[15243]: Failed password for root from 185.220.100.255 port 14010 ssh2
May 29 13:28:37 scw-6657dc sshd[15243]: Failed password for root from 185.220.100.255 port 14010 ssh2
...
2020-05-29 22:13:46
176.113.115.54 attack
Port Scan
2020-05-29 21:41:20
45.134.179.102 attack
Port Scan
2020-05-29 21:51:02
85.93.20.248 attackbotsspam
Port Scan
2020-05-29 21:48:38
195.54.160.30 attack
This source is trying to break into the wordpress site to get sensitive data.
2020-05-29 22:10:40
185.176.27.42 attackbotsspam
scans 10 times in preceeding hours on the ports (in chronological order) 60555 35555 6690 10223 25255 6669 40000 7444 63366 1202 resulting in total of 138 scans from 185.176.27.0/24 block.
2020-05-29 21:37:10
91.207.175.154 attack
Port Scan
2020-05-29 21:47:41
176.113.115.245 attackspambots
Port Scan
2020-05-29 21:40:55
194.26.25.110 attack
Port Scan
2020-05-29 22:11:45
195.54.166.225 attackbotsspam
Port Scan
2020-05-29 21:55:24
198.108.67.82 attack
Port Scan
2020-05-29 21:30:25
138.68.224.83 attackspam
Port Scan
2020-05-29 21:44:48
45.14.150.130 attackspambots
firewall-block, port(s): 24126/tcp
2020-05-29 21:51:19

Recently Reported IPs

61.173.221.148 247.160.20.201 152.67.60.99 189.67.179.101
43.6.114.246 205.146.133.104 52.221.86.138 160.99.34.172
14.224.91.27 79.187.112.73 117.234.30.230 68.99.51.14
87.115.231.201 3.64.107.20 211.63.204.95 243.193.14.4
95.162.142.49 162.41.151.51 71.222.221.125 138.17.237.32