Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.136.43.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.136.43.8.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 18:46:29 CST 2022
;; MSG SIZE  rcvd: 104
Host info
8.43.136.18.in-addr.arpa domain name pointer ec2-18-136-43-8.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.43.136.18.in-addr.arpa	name = ec2-18-136-43-8.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.34 attackbots
Port scan on 7 port(s): 22089 22695 22789 22790 23080 23081 23082
2020-07-31 14:24:42
46.101.175.250 attackbotsspam
2020-07-31T12:57:24.024594hostname sshd[3195]: Failed password for root from 46.101.175.250 port 38372 ssh2
...
2020-07-31 14:39:26
222.240.228.75 attack
Jul 31 07:32:49 ns381471 sshd[24057]: Failed password for root from 222.240.228.75 port 57827 ssh2
2020-07-31 14:33:26
198.12.225.100 attackbots
198.12.225.100 - - [31/Jul/2020:07:21:45 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1867 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.225.100 - - [31/Jul/2020:07:21:47 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.12.225.100 - - [31/Jul/2020:07:21:47 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 14:30:19
212.95.137.164 attackspam
Jul 31 07:39:27 dev0-dcde-rnet sshd[1734]: Failed password for root from 212.95.137.164 port 57486 ssh2
Jul 31 07:47:21 dev0-dcde-rnet sshd[1881]: Failed password for root from 212.95.137.164 port 59756 ssh2
2020-07-31 14:19:57
222.240.1.0 attack
2020-07-31T05:49:49.714596galaxy.wi.uni-potsdam.de sshd[12314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-07-31T05:49:51.969975galaxy.wi.uni-potsdam.de sshd[12314]: Failed password for root from 222.240.1.0 port 11526 ssh2
2020-07-31T05:51:11.554447galaxy.wi.uni-potsdam.de sshd[12501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-07-31T05:51:13.397415galaxy.wi.uni-potsdam.de sshd[12501]: Failed password for root from 222.240.1.0 port 42414 ssh2
2020-07-31T05:52:37.679529galaxy.wi.uni-potsdam.de sshd[12628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.240.1.0  user=root
2020-07-31T05:52:39.664065galaxy.wi.uni-potsdam.de sshd[12628]: Failed password for root from 222.240.1.0 port 24483 ssh2
2020-07-31T05:54:05.380728galaxy.wi.uni-potsdam.de sshd[12806]: pam_unix(sshd:auth): authentication failure; 
...
2020-07-31 14:29:54
106.13.29.92 attackbots
Invalid user MYUSER from 106.13.29.92 port 35020
2020-07-31 14:40:37
181.191.241.6 attackspambots
Bruteforce detected by fail2ban
2020-07-31 14:36:59
114.113.152.171 attack
Unauthorised access (Jul 31) SRC=114.113.152.171 LEN=40 TTL=233 ID=62025 TCP DPT=1433 WINDOW=1024 SYN
2020-07-31 14:21:05
218.92.0.247 attackspambots
SSH Brute-force
2020-07-31 14:13:17
112.85.42.94 attackspam
Jul 31 05:49:15 bsd01 sshd[83152]: Unable to negotiate with 112.85.42.94 port 35926: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul 31 05:50:36 bsd01 sshd[83188]: Unable to negotiate with 112.85.42.94 port 54231: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul 31 05:51:58 bsd01 sshd[83195]: Unable to negotiate with 112.85.42.94 port 15057: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jul 31 
...
2020-07-31 14:08:25
112.216.3.211 attackbotsspam
Jul 31 06:41:58 vps647732 sshd[883]: Failed password for root from 112.216.3.211 port 46942 ssh2
...
2020-07-31 14:18:38
51.37.149.181 attack
Jul 30 22:29:10 server1 sshd\[16297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.37.149.181  user=root
Jul 30 22:29:12 server1 sshd\[16297\]: Failed password for root from 51.37.149.181 port 33778 ssh2
Jul 30 22:33:41 server1 sshd\[17248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.37.149.181  user=root
Jul 30 22:33:43 server1 sshd\[17248\]: Failed password for root from 51.37.149.181 port 47530 ssh2
Jul 30 22:38:39 server1 sshd\[18364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.37.149.181  user=root
...
2020-07-31 14:43:26
103.119.30.193 attack
2020-07-30T23:48:30.666930devel sshd[13871]: Failed password for root from 103.119.30.193 port 54762 ssh2
2020-07-30T23:54:34.907032devel sshd[14503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.30.193  user=root
2020-07-30T23:54:36.622864devel sshd[14503]: Failed password for root from 103.119.30.193 port 40398 ssh2
2020-07-31 14:07:58
178.128.233.69 attackbots
firewall-block, port(s): 9714/tcp
2020-07-31 14:34:12

Recently Reported IPs

18.136.40.33 18.136.63.181 18.136.67.123 18.136.56.18
18.136.76.41 18.136.64.66 18.136.78.230 18.136.83.14
18.136.84.244 18.136.84.129 18.136.97.250 18.136.85.165
18.136.83.208 18.138.110.223 18.138.112.132 18.138.111.209
18.138.119.177 18.138.119.5 18.138.112.1 18.138.110.145