Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.134.196.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;18.134.196.144.			IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111301 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 14 07:19:53 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 144.196.134.18.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.196.134.18.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.79.141.158 attackbotsspam
Invalid user admin from 103.79.141.158 port 51028
2019-10-25 15:18:36
165.227.237.84 attack
Oct 25 09:38:12 sauna sshd[215551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.237.84
Oct 25 09:38:14 sauna sshd[215551]: Failed password for invalid user jfrog from 165.227.237.84 port 57090 ssh2
...
2019-10-25 15:22:38
1.34.76.230 attackspam
Automatic report - Banned IP Access
2019-10-25 15:51:20
106.13.26.40 attackbots
Invalid user dnscache from 106.13.26.40 port 36211
2019-10-25 15:21:35
94.102.57.169 attackbotsspam
110/tcp 110/tcp 110/tcp
[2019-10-25]3pkt
2019-10-25 15:47:25
180.167.201.246 attackbotsspam
Oct 25 07:10:19 www sshd\[6558\]: Failed password for root from 180.167.201.246 port 49153 ssh2Oct 25 07:14:38 www sshd\[6725\]: Invalid user admin from 180.167.201.246Oct 25 07:14:40 www sshd\[6725\]: Failed password for invalid user admin from 180.167.201.246 port 41186 ssh2
...
2019-10-25 15:33:17
201.145.178.126 attackspambots
81/tcp
[2019-10-25]1pkt
2019-10-25 15:30:47
202.152.1.67 attackbots
SSH bruteforce
2019-10-25 15:28:11
197.56.52.220 attackspambots
23/tcp
[2019-10-25]1pkt
2019-10-25 15:27:10
36.77.95.20 attackbotsspam
445/tcp
[2019-10-25]1pkt
2019-10-25 15:31:57
14.164.134.11 attackbots
445/tcp
[2019-10-25]1pkt
2019-10-25 15:34:09
180.166.192.66 attackbotsspam
Oct 24 18:06:40 hanapaa sshd\[23677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.192.66  user=root
Oct 24 18:06:41 hanapaa sshd\[23677\]: Failed password for root from 180.166.192.66 port 13776 ssh2
Oct 24 18:11:14 hanapaa sshd\[24154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.192.66  user=root
Oct 24 18:11:16 hanapaa sshd\[24154\]: Failed password for root from 180.166.192.66 port 46911 ssh2
Oct 24 18:15:52 hanapaa sshd\[24544\]: Invalid user roderica from 180.166.192.66
2019-10-25 15:52:24
113.173.48.129 attack
88/tcp 88/tcp
[2019-09-16/10-25]2pkt
2019-10-25 15:19:48
118.69.54.7 attackbots
445/tcp
[2019-10-25]1pkt
2019-10-25 15:44:09
193.33.111.237 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-10-25 15:48:12

Recently Reported IPs

112.113.131.26 134.145.218.44 83.189.19.95 43.161.156.230
166.100.15.254 91.188.188.154 17.194.185.137 54.224.47.128
130.73.110.180 246.63.64.7 86.59.132.29 104.162.180.67
19.6.68.65 188.19.19.181 140.163.40.102 134.8.1.59
186.169.89.126 114.38.46.162 41.236.49.194 245.121.231.215