Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.136.84.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.136.84.129.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 18:46:32 CST 2022
;; MSG SIZE  rcvd: 106
Host info
129.84.136.18.in-addr.arpa domain name pointer ec2-18-136-84-129.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.84.136.18.in-addr.arpa	name = ec2-18-136-84-129.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.97.20.232 attackspam
27017/tcp 9200/tcp...
[2020-03-10/05-06]12pkt,2pt.(tcp)
2020-05-07 02:17:19
172.104.242.173 attackbotsspam
Trying ports that it shouldn't be.
2020-05-07 02:10:56
172.105.52.86 attack
scans once in preceeding hours on the ports (in chronological order) 5060 resulting in total of 4 scans from 172.104.0.0/15 block.
2020-05-07 02:10:29
185.200.118.77 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 3128 resulting in total of 5 scans from 185.200.118.0/24 block.
2020-05-07 02:04:33
185.216.140.252 attackspambots
05/06/2020-13:25:56.170847 185.216.140.252 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-07 02:02:33
138.197.12.187 attack
scans 2 times in preceeding hours on the ports (in chronological order) 1214 1241
2020-05-07 01:58:49
185.175.93.34 attack
ET DROP Dshield Block Listed Source group 1 - port: 3395 proto: TCP cat: Misc Attack
2020-05-07 02:06:36
185.175.93.6 attack
05/06/2020-13:41:25.091902 185.175.93.6 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-07 02:08:12
45.143.220.134 attack
05/06/2020-13:30:04.508565 45.143.220.134 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-07 02:23:12
139.59.66.245 attack
scans 2 times in preceeding hours on the ports (in chronological order) 15422 15422
2020-05-07 01:58:21
113.214.30.171 attack
" "
2020-05-07 02:14:16
159.65.146.52 attack
Fail2Ban Ban Triggered
2020-05-07 01:54:08
45.56.91.118 attackbotsspam
Unauthorized connection attempt from IP address 45.56.91.118 on Port 3389(RDP)
2020-05-07 02:24:57
45.227.254.30 attackspambots
firewall-block, port(s): 20720/tcp
2020-05-07 02:22:09
45.143.220.151 attackspambots
[MK-Root1] Blocked by UFW
2020-05-07 02:22:43

Recently Reported IPs

18.136.84.244 18.136.97.250 18.136.85.165 18.136.83.208
18.138.110.223 18.138.112.132 18.138.111.209 18.138.119.177
18.138.119.5 18.138.112.1 18.138.110.145 18.138.112.110
18.138.140.249 18.138.150.58 18.138.135.118 18.138.152.102
18.138.175.194 18.138.130.241 18.138.158.230 18.138.154.41