Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.213.85.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25128
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;18.213.85.124.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082400 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 00:35:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
124.85.213.18.in-addr.arpa domain name pointer ec2-18-213-85-124.compute-1.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
124.85.213.18.in-addr.arpa	name = ec2-18-213-85-124.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.79.154.229 attackbotsspam
Automatic report - Banned IP Access
2019-07-14 16:46:57
137.74.119.106 attack
Jul 14 11:44:31 hosting sshd[5399]: Invalid user cs from 137.74.119.106 port 48408
...
2019-07-14 16:57:29
119.29.6.254 attackspambots
firewall-block, port(s): 8545/tcp
2019-07-14 17:05:26
49.149.5.48 attackbotsspam
Unauthorized connection attempt from IP address 49.149.5.48 on Port 445(SMB)
2019-07-14 17:04:29
104.222.32.135 attackspambots
Unauthorised access (Jul 14) SRC=104.222.32.135 LEN=40 TTL=239 ID=7088 TCP DPT=445 WINDOW=1024 SYN
2019-07-14 16:41:47
121.46.93.208 attack
Jul 14 02:29:59 nextcloud sshd\[23267\]: Invalid user tit0nich from 121.46.93.208
Jul 14 02:30:02 nextcloud sshd\[23267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.93.208
Jul 14 02:30:03 nextcloud sshd\[23267\]: Failed password for invalid user tit0nich from 121.46.93.208 port 57928 ssh2
...
2019-07-14 17:04:46
213.97.127.122 attackbotsspam
Unauthorized connection attempt from IP address 213.97.127.122 on Port 445(SMB)
2019-07-14 16:24:30
116.107.158.190 attack
Unauthorized connection attempt from IP address 116.107.158.190 on Port 445(SMB)
2019-07-14 16:44:09
212.14.166.74 attack
Unauthorized connection attempt from IP address 212.14.166.74 on Port 445(SMB)
2019-07-14 16:37:29
45.127.106.51 attackbotsspam
Invalid user nagios from 45.127.106.51 port 43962
2019-07-14 16:33:06
36.111.35.10 attackspambots
Jul 14 09:56:55 minden010 sshd[29783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.35.10
Jul 14 09:56:57 minden010 sshd[29783]: Failed password for invalid user gan from 36.111.35.10 port 54141 ssh2
Jul 14 09:59:50 minden010 sshd[30754]: Failed password for root from 36.111.35.10 port 37572 ssh2
...
2019-07-14 16:26:31
111.206.198.96 attackspam
Bad bot/spoofed identity
2019-07-14 16:54:09
27.71.209.22 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-14 04:27:55,319 INFO [amun_request_handler] PortScan Detected on Port: 445 (27.71.209.22)
2019-07-14 16:42:20
200.225.221.101 attack
ECShop Remote Code Execution Vulnerability
2019-07-14 16:53:09
200.94.150.22 attack
Unauthorized connection attempt from IP address 200.94.150.22 on Port 445(SMB)
2019-07-14 16:28:02

Recently Reported IPs

97.105.233.4 176.36.38.107 23.42.50.47 211.219.102.110
85.143.155.118 126.34.178.92 1.204.191.90 187.186.210.111
70.63.185.237 149.92.146.77 44.72.209.205 46.222.15.18
65.222.193.21 59.103.237.154 126.56.63.223 212.92.168.88
83.194.158.42 186.249.18.173 150.29.23.199 24.198.100.173