Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.134.105.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.134.105.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 04:31:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
145.105.134.18.in-addr.arpa domain name pointer ec2-18-134-105-145.eu-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.105.134.18.in-addr.arpa	name = ec2-18-134-105-145.eu-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.97.161.162 attackspambots
Invalid user applmgr from 209.97.161.162 port 36223
2019-08-22 08:14:39
137.59.162.169 attack
Aug 21 13:43:31 kapalua sshd\[11598\]: Invalid user debby from 137.59.162.169
Aug 21 13:43:31 kapalua sshd\[11598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
Aug 21 13:43:33 kapalua sshd\[11598\]: Failed password for invalid user debby from 137.59.162.169 port 46935 ssh2
Aug 21 13:52:53 kapalua sshd\[12493\]: Invalid user nelson from 137.59.162.169
Aug 21 13:52:53 kapalua sshd\[12493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
2019-08-22 07:55:38
209.97.174.145 attackspambots
vps1:sshd-InvalidUser
2019-08-22 08:09:40
35.233.36.227 attackspambots
Aug 22 02:26:00 lnxded64 sshd[19125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.233.36.227
Aug 22 02:26:00 lnxded64 sshd[19125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.233.36.227
Aug 22 02:26:02 lnxded64 sshd[19125]: Failed password for invalid user SPSS from 35.233.36.227 port 41792 ssh2
2019-08-22 08:26:41
122.53.62.83 attack
Aug 21 23:45:03 game-panel sshd[13926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83
Aug 21 23:45:05 game-panel sshd[13926]: Failed password for invalid user hall from 122.53.62.83 port 50895 ssh2
Aug 21 23:50:08 game-panel sshd[14180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83
2019-08-22 07:56:24
103.237.147.38 attackbotsspam
2019-08-21T22:27:43Z - RDP login failed multiple times. (103.237.147.38)
2019-08-22 08:20:44
209.45.31.224 attackbotsspam
vps1:sshd-InvalidUser
2019-08-22 08:24:32
209.235.67.48 attackspambots
vps1:sshd-InvalidUser
2019-08-22 08:37:20
193.70.32.148 attack
2019-08-21T22:59:18.693127abusebot-8.cloudsearch.cf sshd\[29301\]: Invalid user xbmc from 193.70.32.148 port 50644
2019-08-22 08:08:23
104.248.211.180 attackspambots
Invalid user cacti from 104.248.211.180 port 51154
2019-08-22 08:10:00
206.189.147.229 attackbots
Aug 21 23:31:05 MK-Soft-VM4 sshd\[26460\]: Invalid user redmine from 206.189.147.229 port 60862
Aug 21 23:31:05 MK-Soft-VM4 sshd\[26460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.147.229
Aug 21 23:31:07 MK-Soft-VM4 sshd\[26460\]: Failed password for invalid user redmine from 206.189.147.229 port 60862 ssh2
...
2019-08-22 08:18:54
41.210.128.37 attackbotsspam
Aug 21 19:30:34 ny01 sshd[7481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.210.128.37
Aug 21 19:30:36 ny01 sshd[7481]: Failed password for invalid user michi from 41.210.128.37 port 60885 ssh2
Aug 21 19:36:23 ny01 sshd[8026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.210.128.37
2019-08-22 07:58:48
118.25.237.124 attackspambots
Aug 22 02:49:00 server sshd\[2577\]: Invalid user cs from 118.25.237.124 port 47248
Aug 22 02:49:00 server sshd\[2577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.237.124
Aug 22 02:49:02 server sshd\[2577\]: Failed password for invalid user cs from 118.25.237.124 port 47248 ssh2
Aug 22 02:54:05 server sshd\[19621\]: Invalid user venta from 118.25.237.124 port 34760
Aug 22 02:54:05 server sshd\[19621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.237.124
2019-08-22 08:00:38
178.128.55.49 attackbotsspam
Aug 22 00:16:30 hcbbdb sshd\[20809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.49  user=root
Aug 22 00:16:32 hcbbdb sshd\[20809\]: Failed password for root from 178.128.55.49 port 39558 ssh2
Aug 22 00:21:12 hcbbdb sshd\[21462\]: Invalid user moylea from 178.128.55.49
Aug 22 00:21:12 hcbbdb sshd\[21462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.49
Aug 22 00:21:13 hcbbdb sshd\[21462\]: Failed password for invalid user moylea from 178.128.55.49 port 38756 ssh2
2019-08-22 08:26:10
91.225.122.58 attack
Aug 22 01:58:02 cp sshd[19451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.122.58
2019-08-22 08:10:17

Recently Reported IPs

187.177.67.47 202.121.91.136 134.207.241.18 71.90.7.193
59.95.221.143 49.103.172.193 187.217.95.93 73.223.124.122
51.103.231.166 46.37.104.4 156.24.84.88 228.6.167.74
238.137.131.249 236.174.93.36 162.174.216.108 96.46.73.29
90.39.224.35 72.252.71.160 165.53.105.156 17.197.130.159