Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lenexa

Region: Kansas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.52.130.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42350
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.52.130.132.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 11:10:31 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 132.130.52.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 132.130.52.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
63.80.189.157 attack
Autoban   63.80.189.157 AUTH/CONNECT
2019-12-13 01:46:24
63.81.87.101 attack
Autoban   63.81.87.101 AUTH/CONNECT
2019-12-13 01:19:45
185.164.72.76 attackbotsspam
Dec 12 18:03:10 debian-2gb-nbg1-2 kernel: \[24451728.205233\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.164.72.76 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=13989 PROTO=TCP SPT=59715 DPT=4489 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-13 01:23:12
63.80.189.173 attack
Autoban   63.80.189.173 AUTH/CONNECT
2019-12-13 01:34:11
63.81.87.107 attackspambots
Autoban   63.81.87.107 AUTH/CONNECT
2019-12-13 01:17:35
63.80.189.155 attackspam
Autoban   63.80.189.155 AUTH/CONNECT
2019-12-13 01:47:29
51.79.60.147 attack
--- report ---
Dec 12 12:45:16 sshd: Connection from 51.79.60.147 port 49024
Dec 12 12:45:16 sshd: Invalid user dermardiros from 51.79.60.147
Dec 12 12:45:18 sshd: Failed password for invalid user dermardiros from 51.79.60.147 port 49024 ssh2
Dec 12 12:45:18 sshd: Received disconnect from 51.79.60.147: 11: Bye Bye [preauth]
2019-12-13 01:32:35
95.241.44.156 attack
Invalid user apache from 95.241.44.156 port 53898
2019-12-13 01:43:14
63.81.87.113 attack
Autoban   63.81.87.113 AUTH/CONNECT
2019-12-13 01:14:41
203.70.217.40 attack
445/tcp 445/tcp
[2019-12-12]2pkt
2019-12-13 01:42:22
63.80.189.160 attack
Autoban   63.80.189.160 AUTH/CONNECT
2019-12-13 01:43:47
63.80.189.169 attackspam
Autoban   63.80.189.169 AUTH/CONNECT
2019-12-13 01:36:15
63.80.189.153 attackspam
Autoban   63.80.189.153 AUTH/CONNECT
2019-12-13 01:48:56
63.80.189.149 attackbotsspam
Autoban   63.80.189.149 AUTH/CONNECT
2019-12-13 01:52:52
188.147.161.162 attackbotsspam
Dec 12 18:19:28 herz-der-gamer sshd[3357]: Invalid user weblogic from 188.147.161.162 port 49682
Dec 12 18:19:28 herz-der-gamer sshd[3357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.147.161.162
Dec 12 18:19:28 herz-der-gamer sshd[3357]: Invalid user weblogic from 188.147.161.162 port 49682
Dec 12 18:19:30 herz-der-gamer sshd[3357]: Failed password for invalid user weblogic from 188.147.161.162 port 49682 ssh2
...
2019-12-13 01:20:30

Recently Reported IPs

81.16.133.116 199.124.240.87 209.213.215.57 96.15.137.53
211.113.239.130 108.65.11.23 8.162.247.196 8.66.133.239
170.86.6.13 48.115.180.87 119.134.171.4 31.236.254.91
89.186.216.101 118.251.114.95 33.90.34.147 173.161.162.41
50.116.72.164 41.226.18.56 218.188.20.154 60.134.226.213