Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.215.108.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.215.108.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:59:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
134.108.215.18.in-addr.arpa domain name pointer ec2-18-215-108-134.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.108.215.18.in-addr.arpa	name = ec2-18-215-108-134.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.167.3.27 attackspam
Automatic report - Port Scan Attack
2020-04-01 08:24:47
165.227.109.88 attack
Unauthorized connection attempt detected, IP banned.
2020-04-01 08:47:37
190.233.58.225 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2020-04-01 08:29:36
51.15.41.165 attackbots
$f2bV_matches
2020-04-01 08:35:29
91.116.136.162 attackbotsspam
Scanned 3 times in the last 24 hours on port 22
2020-04-01 08:53:20
110.43.37.200 attack
Brute force SMTP login attempted.
...
2020-04-01 08:40:18
145.239.88.43 attack
Invalid user xieyufen from 145.239.88.43 port 55800
2020-04-01 08:23:41
110.232.89.118 attackbots
Brute force SMTP login attempted.
...
2020-04-01 08:53:50
121.135.205.200 attackspambots
srv.marc-hoffrichter.de:80 121.135.205.200 - - [31/Mar/2020:23:29:01 +0200] "GET / HTTP/1.0" 400 0 "-" "-"
2020-04-01 08:54:31
202.70.80.27 attack
Mar 31 23:23:18 meumeu sshd[10300]: Failed password for root from 202.70.80.27 port 58852 ssh2
Mar 31 23:25:39 meumeu sshd[10614]: Failed password for root from 202.70.80.27 port 50574 ssh2
...
2020-04-01 08:21:39
181.143.186.235 attackspambots
Invalid user dfk from 181.143.186.235 port 38254
2020-04-01 08:31:08
110.55.109.42 attackspambots
Brute force SMTP login attempted.
...
2020-04-01 08:26:40
124.74.137.174 attack
Apr  1 02:03:34 * sshd[32274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.137.174
Apr  1 02:03:36 * sshd[32274]: Failed password for invalid user mc from 124.74.137.174 port 9664 ssh2
2020-04-01 08:39:52
125.209.80.130 attack
Repeated brute force against a port
2020-04-01 08:52:29
212.64.43.52 attack
2020-03-31T21:56:50.967567shield sshd\[13439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.43.52  user=root
2020-03-31T21:56:52.339522shield sshd\[13439\]: Failed password for root from 212.64.43.52 port 54312 ssh2
2020-03-31T22:02:32.591416shield sshd\[15212\]: Invalid user fanshikui from 212.64.43.52 port 60036
2020-03-31T22:02:32.594971shield sshd\[15212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.43.52
2020-03-31T22:02:34.252690shield sshd\[15212\]: Failed password for invalid user fanshikui from 212.64.43.52 port 60036 ssh2
2020-04-01 08:52:13

Recently Reported IPs

211.68.112.92 130.108.77.44 150.50.0.62 84.77.55.130
199.156.4.75 154.30.106.233 228.183.114.188 163.172.18.89
188.106.93.175 78.228.129.178 75.17.17.42 16.107.48.148
26.168.122.134 40.197.194.196 89.194.251.127 169.107.247.18
82.197.136.190 46.245.228.146 168.106.255.125 204.4.133.9