Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.140.245.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.140.245.12.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:54:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.245.140.18.in-addr.arpa domain name pointer ec2-18-140-245-12.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.245.140.18.in-addr.arpa	name = ec2-18-140-245-12.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.51.75.246 attackbots
Unauthorized connection attempt from IP address 92.51.75.246 on Port 445(SMB)
2019-08-25 12:09:37
134.175.176.160 attack
Reported by AbuseIPDB proxy server.
2019-08-25 11:46:33
221.215.180.165 attackbotsspam
Unauthorised access (Aug 25) SRC=221.215.180.165 LEN=40 TTL=49 ID=27432 TCP DPT=8080 WINDOW=45275 SYN 
Unauthorised access (Aug 24) SRC=221.215.180.165 LEN=40 TTL=49 ID=187 TCP DPT=8080 WINDOW=50150 SYN 
Unauthorised access (Aug 24) SRC=221.215.180.165 LEN=40 TTL=49 ID=16605 TCP DPT=8080 WINDOW=54846 SYN 
Unauthorised access (Aug 23) SRC=221.215.180.165 LEN=40 TTL=49 ID=34307 TCP DPT=8080 WINDOW=42164 SYN 
Unauthorised access (Aug 23) SRC=221.215.180.165 LEN=40 TTL=49 ID=4718 TCP DPT=8080 WINDOW=39038 SYN 
Unauthorised access (Aug 22) SRC=221.215.180.165 LEN=40 TTL=49 ID=2510 TCP DPT=8080 WINDOW=58735 SYN
2019-08-25 11:11:39
159.65.159.178 attackbots
Aug 25 01:03:45 work-partkepr sshd\[28886\]: Invalid user naomi from 159.65.159.178 port 60630
Aug 25 01:03:45 work-partkepr sshd\[28886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.159.178
...
2019-08-25 11:55:57
60.184.241.200 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-25 11:47:41
51.75.32.141 attackbots
2019-08-24T21:40:17.230791abusebot.cloudsearch.cf sshd\[3415\]: Invalid user man from 51.75.32.141 port 60034
2019-08-25 11:41:53
142.93.114.123 attackbots
SSH Brute Force, server-1 sshd[1459]: Failed password for invalid user admin from 142.93.114.123 port 57608 ssh2
2019-08-25 11:59:58
78.39.227.152 attack
Unauthorized connection attempt from IP address 78.39.227.152 on Port 445(SMB)
2019-08-25 11:54:48
91.121.102.44 attackbots
DATE:2019-08-25 00:31:34,IP:91.121.102.44,MATCHES:11,PORT:ssh
2019-08-25 11:37:10
187.188.169.123 attackbotsspam
Aug 24 14:30:57 tdfoods sshd\[15670\]: Invalid user kouno from 187.188.169.123
Aug 24 14:30:57 tdfoods sshd\[15670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
Aug 24 14:30:59 tdfoods sshd\[15670\]: Failed password for invalid user kouno from 187.188.169.123 port 48328 ssh2
Aug 24 14:35:55 tdfoods sshd\[16049\]: Invalid user kito from 187.188.169.123
Aug 24 14:35:55 tdfoods sshd\[16049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-169-123.totalplay.net
2019-08-25 12:08:39
111.198.54.177 attack
Aug 24 23:27:21 ny01 sshd[14244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177
Aug 24 23:27:23 ny01 sshd[14244]: Failed password for invalid user ubnt from 111.198.54.177 port 12748 ssh2
Aug 24 23:30:41 ny01 sshd[14727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.177
2019-08-25 11:34:43
193.32.163.182 attack
CloudCIX Reconnaissance Scan Detected, PTR: hosting-by.cloud-home.me.
2019-08-25 12:04:46
117.221.70.6 attackbots
DATE:2019-08-25 05:25:30,IP:117.221.70.6,MATCHES:11,PORT:ssh
2019-08-25 11:30:42
58.27.217.75 attackbots
Aug 25 03:39:09 mail sshd[15937]: Invalid user tester from 58.27.217.75
Aug 25 03:39:09 mail sshd[15937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.217.75
Aug 25 03:39:09 mail sshd[15937]: Invalid user tester from 58.27.217.75
Aug 25 03:39:12 mail sshd[15937]: Failed password for invalid user tester from 58.27.217.75 port 53176 ssh2
Aug 25 03:50:25 mail sshd[17357]: Invalid user cloud from 58.27.217.75
...
2019-08-25 11:40:39
195.181.172.141 attack
3389BruteforceIDS
2019-08-25 11:19:25

Recently Reported IPs

223.73.236.7 185.58.18.8 156.193.204.180 61.143.45.59
194.219.166.25 72.255.62.3 115.234.147.4 64.227.165.245
222.247.5.34 45.56.105.119 162.218.210.22 88.135.45.245
196.188.49.160 36.74.242.112 218.104.199.2 125.75.234.202
185.38.176.134 123.5.184.166 183.64.235.184 121.160.16.238