Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.118.140.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.118.140.153.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:29:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
153.140.118.18.in-addr.arpa domain name pointer ec2-18-118-140-153.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
153.140.118.18.in-addr.arpa	name = ec2-18-118-140-153.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.206.90.149 attack
Invalid user debian from 123.206.90.149 port 52008
2019-11-01 08:02:55
178.65.36.28 attackspam
Chat Spam
2019-11-01 07:50:34
200.87.138.178 attack
Invalid user mangiameli from 200.87.138.178 port 5090
2019-11-01 08:17:17
212.237.54.236 attackbotsspam
Invalid user ubuntu from 212.237.54.236 port 49102
2019-11-01 08:16:13
119.82.127.155 attackbotsspam
Invalid user victoria from 119.82.127.155 port 53496
2019-11-01 08:03:12
68.183.133.21 attackbotsspam
Invalid user test from 68.183.133.21 port 40650
2019-11-01 08:11:16
134.73.51.144 attackbotsspam
Lines containing failures of 134.73.51.144
Oct 31 21:02:18 shared04 postfix/smtpd[379]: connect from teaching.wereviewthings.com[134.73.51.144]
Oct 31 21:02:18 shared04 policyd-spf[420]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=134.73.51.144; helo=teaching.mathieudrabik.co; envelope-from=x@x
Oct x@x
Oct 31 21:02:19 shared04 postfix/smtpd[379]: disconnect from teaching.wereviewthings.com[134.73.51.144] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.73.51.144
2019-11-01 07:51:08
116.196.82.52 attackbotsspam
Automatic report - Banned IP Access
2019-11-01 08:03:56
47.103.36.53 attackspam
(Oct 31)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=5426 TCP DPT=8080 WINDOW=15371 SYN 
 (Oct 31)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=38175 TCP DPT=8080 WINDOW=3381 SYN 
 (Oct 31)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=27480 TCP DPT=8080 WINDOW=31033 SYN 
 (Oct 30)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=54644 TCP DPT=8080 WINDOW=59605 SYN 
 (Oct 29)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=5824 TCP DPT=8080 WINDOW=15371 SYN 
 (Oct 29)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=45854 TCP DPT=8080 WINDOW=31033 SYN 
 (Oct 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=4390 TCP DPT=8080 WINDOW=15371 SYN 
 (Oct 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=7120 TCP DPT=8080 WINDOW=31033 SYN 
 (Oct 28)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=18856 TCP DPT=8080 WINDOW=59605 SYN 
 (Oct 27)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=12584 TCP DPT=8080 WINDOW=3381 SYN 
 (Oct 27)  LEN=40 TOS=0x10 PREC=0x40 TTL=44 ID=60412 TCP DPT=8080 WINDOW=59605 SYN
2019-11-01 07:38:21
199.115.128.241 attackbotsspam
5x Failed Password
2019-11-01 07:37:35
103.15.62.69 attackbotsspam
Invalid user sftp from 103.15.62.69 port 41416
2019-11-01 08:07:41
106.12.131.135 attack
Invalid user lorenab from 106.12.131.135 port 41920
2019-11-01 08:06:16
91.54.33.181 attackbots
Invalid user pi from 91.54.33.181 port 35420
2019-11-01 08:09:57
182.219.172.224 attackspam
Invalid user kuroiwa from 182.219.172.224 port 52098
2019-11-01 07:57:02
162.243.238.171 attackbotsspam
Nov  1 00:02:05 cp sshd[5956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.238.171
2019-11-01 07:59:16

Recently Reported IPs

177.157.7.24 197.55.42.39 189.207.29.202 183.2.90.238
1.168.27.140 179.106.105.63 106.11.156.51 154.6.24.247
122.52.168.226 116.98.125.100 202.62.90.216 120.57.211.179
168.232.160.168 43.231.78.117 90.138.245.87 187.108.70.200
31.171.72.162 156.199.185.56 172.104.15.118 83.171.255.37