Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.130.164.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.130.164.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:41:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
136.164.130.18.in-addr.arpa domain name pointer dmx1.eb1tst.uk.striata.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.164.130.18.in-addr.arpa	name = dmx1.eb1tst.uk.striata.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.162.80.183 attack
8080/tcp
[2019-06-26]1pkt
2019-06-27 02:22:22
222.217.221.181 attackbots
Brute force attempt
2019-06-27 02:32:45
36.89.146.252 attackspambots
Jun 26 16:34:58 db sshd\[7411\]: Invalid user lai from 36.89.146.252
Jun 26 16:34:58 db sshd\[7411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.146.252 
Jun 26 16:35:00 db sshd\[7411\]: Failed password for invalid user lai from 36.89.146.252 port 30846 ssh2
Jun 26 16:38:18 db sshd\[7465\]: Invalid user gy from 36.89.146.252
Jun 26 16:38:18 db sshd\[7465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.146.252 
...
2019-06-27 02:04:38
49.83.214.115 attack
22/tcp
[2019-06-26]1pkt
2019-06-27 02:07:52
110.156.149.19 attackbots
23/tcp
[2019-06-26]1pkt
2019-06-27 02:26:38
115.29.5.66 attackbotsspam
TCP src-port=53730   dst-port=25    dnsbl-sorbs abuseat-org barracuda         (898)
2019-06-27 01:49:09
154.0.173.85 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:22:49,651 INFO [shellcode_manager] (154.0.173.85) no match, writing hexdump (ea84f5d4a40f6b9ddd7a7981d52afdec :2098627) - MS17010 (EternalBlue)
2019-06-27 02:01:39
49.88.226.183 attackspambots
SASL Brute Force
2019-06-27 02:25:04
191.205.208.23 attack
81/tcp
[2019-06-26]1pkt
2019-06-27 02:31:02
94.54.66.173 attack
DATE:2019-06-26 15:11:23, IP:94.54.66.173, PORT:ssh brute force auth on SSH service (patata)
2019-06-27 01:52:29
107.170.192.6 attackspam
22/tcp 179/tcp 21029/tcp...
[2019-04-26/06-26]51pkt,41pt.(tcp),5pt.(udp)
2019-06-27 02:28:14
203.221.33.86 attackbots
23/tcp
[2019-06-26]1pkt
2019-06-27 02:23:52
87.100.243.117 attackbotsspam
Jun 26 18:52:32 s64-1 sshd[29891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.100.243.117
Jun 26 18:52:35 s64-1 sshd[29891]: Failed password for invalid user admin from 87.100.243.117 port 42482 ssh2
Jun 26 18:59:34 s64-1 sshd[29962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.100.243.117
...
2019-06-27 02:20:25
74.82.47.34 attackspambots
6379/tcp 9200/tcp 11211/tcp...
[2019-04-27/06-26]37pkt,13pt.(tcp),1pt.(udp)
2019-06-27 01:44:59
62.12.69.144 attackbots
5555/tcp
[2019-06-26]1pkt
2019-06-27 02:15:20

Recently Reported IPs

199.186.170.220 219.97.182.4 211.167.72.163 254.218.38.80
20.149.42.127 6.30.26.225 198.9.84.52 254.65.0.152
81.14.17.206 31.213.165.167 26.122.215.155 175.174.43.180
51.216.12.54 167.222.114.20 184.227.167.63 141.132.248.45
34.203.97.160 250.138.213.111 108.197.160.174 59.128.123.105