Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.139.245.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.139.245.234.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042802 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 29 11:59:12 CST 2023
;; MSG SIZE  rcvd: 107
Host info
234.245.139.18.in-addr.arpa domain name pointer ec2-18-139-245-234.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.245.139.18.in-addr.arpa	name = ec2-18-139-245-234.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.44.106.30 attackbotsspam
Aug  3 07:41:35 srv-4 sshd\[13209\]: Invalid user admin from 211.44.106.30
Aug  3 07:41:35 srv-4 sshd\[13209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.106.30
Aug  3 07:41:37 srv-4 sshd\[13209\]: Failed password for invalid user admin from 211.44.106.30 port 44612 ssh2
...
2019-08-03 20:15:43
103.133.107.56 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-03 20:20:49
104.206.128.54 attackspam
03.08.2019 04:41:58 Connection to port 8444 blocked by firewall
2019-08-03 20:07:39
185.222.211.243 attack
03.08.2019 12:12:23 SMTP access blocked by firewall
2019-08-03 20:28:39
209.17.96.242 attackspam
3000/tcp 9595/tcp 5000/tcp...
[2019-06-03/08-02]69pkt,15pt.(tcp),1pt.(udp)
2019-08-03 20:47:46
218.92.0.212 attackspam
Aug  3 12:16:12 meumeu sshd[7677]: Failed password for root from 218.92.0.212 port 23807 ssh2
Aug  3 12:16:31 meumeu sshd[7677]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 23807 ssh2 [preauth]
Aug  3 12:16:49 meumeu sshd[7749]: Failed password for root from 218.92.0.212 port 26240 ssh2
...
2019-08-03 20:05:18
66.70.250.55 attack
Aug  3 13:41:29 ubuntu-2gb-nbg1-dc3-1 sshd[31207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.250.55
Aug  3 13:41:31 ubuntu-2gb-nbg1-dc3-1 sshd[31207]: Failed password for invalid user user from 66.70.250.55 port 49078 ssh2
...
2019-08-03 19:55:43
103.133.215.240 attackspam
SSH/22 MH Probe, BF, Hack -
2019-08-03 20:32:59
178.237.0.229 attackspambots
Aug  3 07:00:01 mail sshd\[7120\]: Invalid user herbert from 178.237.0.229\
Aug  3 07:00:03 mail sshd\[7120\]: Failed password for invalid user herbert from 178.237.0.229 port 57750 ssh2\
Aug  3 07:04:26 mail sshd\[7135\]: Invalid user broderick from 178.237.0.229\
Aug  3 07:04:28 mail sshd\[7135\]: Failed password for invalid user broderick from 178.237.0.229 port 51604 ssh2\
Aug  3 07:08:42 mail sshd\[7153\]: Invalid user kathy from 178.237.0.229\
Aug  3 07:08:44 mail sshd\[7153\]: Failed password for invalid user kathy from 178.237.0.229 port 45246 ssh2\
2019-08-03 20:16:41
198.108.67.86 attack
Port scan: Attacks repeated for a week
2019-08-03 20:43:54
182.61.148.125 attackbotsspam
Aug  3 06:09:33 www_kotimaassa_fi sshd[16648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.148.125
Aug  3 06:09:35 www_kotimaassa_fi sshd[16648]: Failed password for invalid user happy from 182.61.148.125 port 37216 ssh2
...
2019-08-03 20:43:32
58.11.78.161 attackspambots
Automatic report - Port Scan Attack
2019-08-03 20:49:05
185.94.188.130 attack
scan z
2019-08-03 20:38:16
200.216.30.6 attackbotsspam
03.08.2019 04:57:43 SSH access blocked by firewall
2019-08-03 20:46:49
218.92.0.138 attackspam
web-1 [ssh] SSH Attack
2019-08-03 20:25:57

Recently Reported IPs

227.214.34.166 199.147.52.62 233.126.48.248 220.166.70.150
210.128.172.112 87.252.29.49 213.93.40.119 143.9.211.35
100.47.92.252 254.135.113.73 204.246.104.102 151.111.121.197
203.52.14.131 141.59.118.86 103.52.150.234 44.76.1.123
83.212.196.184 91.216.181.130 135.190.70.146 153.46.181.181