Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: MTN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.94.108.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18575
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.94.108.130.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052900 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 29 14:04:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 130.108.94.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.108.94.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.126.127.6 attack
Oct  8 03:47:51 game-panel sshd[11115]: Failed password for root from 209.126.127.6 port 43148 ssh2
Oct  8 03:51:29 game-panel sshd[11239]: Failed password for root from 209.126.127.6 port 56724 ssh2
2019-10-08 15:49:06
103.134.5.138 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 04:55:16.
2019-10-08 15:41:59
81.22.45.51 attackspam
10/08/2019-03:25:29.913659 81.22.45.51 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-08 15:32:38
66.249.64.135 attack
Automatic report - Banned IP Access
2019-10-08 15:33:33
177.157.9.55 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.157.9.55/ 
 BR - 1H : (316)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN18881 
 
 IP : 177.157.9.55 
 
 CIDR : 177.157.0.0/19 
 
 PREFIX COUNT : 938 
 
 UNIQUE IP COUNT : 4233472 
 
 
 WYKRYTE ATAKI Z ASN18881 :  
  1H - 6 
  3H - 12 
  6H - 23 
 12H - 45 
 24H - 79 
 
 DateTime : 2019-10-08 05:54:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 16:08:13
222.186.175.202 attack
Oct  8 09:33:31 nextcloud sshd\[3577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Oct  8 09:33:33 nextcloud sshd\[3577\]: Failed password for root from 222.186.175.202 port 53234 ssh2
Oct  8 09:33:58 nextcloud sshd\[4414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
...
2019-10-08 15:35:30
111.35.43.31 attackbotsspam
Jul  7 08:40:43 dallas01 sshd[2444]: Failed password for root from 111.35.43.31 port 58643 ssh2
Jul  7 08:40:46 dallas01 sshd[2444]: Failed password for root from 111.35.43.31 port 58643 ssh2
Jul  7 08:40:48 dallas01 sshd[2444]: Failed password for root from 111.35.43.31 port 58643 ssh2
Jul  7 08:40:51 dallas01 sshd[2444]: Failed password for root from 111.35.43.31 port 58643 ssh2
2019-10-08 16:12:34
111.6.76.80 attackspambots
Aug  7 20:37:15 dallas01 sshd[4780]: Failed password for root from 111.6.76.80 port 29079 ssh2
Aug  7 20:37:25 dallas01 sshd[4786]: Failed password for root from 111.6.76.80 port 58125 ssh2
2019-10-08 15:32:18
110.136.137.161 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 08-10-2019 04:55:17.
2019-10-08 15:41:39
112.85.42.87 attackspam
Oct  7 20:25:50 sachi sshd\[12376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Oct  7 20:25:52 sachi sshd\[12376\]: Failed password for root from 112.85.42.87 port 18298 ssh2
Oct  7 20:26:27 sachi sshd\[12416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Oct  7 20:26:29 sachi sshd\[12416\]: Failed password for root from 112.85.42.87 port 50799 ssh2
Oct  7 20:27:05 sachi sshd\[12463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2019-10-08 15:53:44
148.70.84.130 attack
2019-10-08T07:15:07.402884abusebot-5.cloudsearch.cf sshd\[32643\]: Invalid user butthead from 148.70.84.130 port 41256
2019-10-08 15:43:34
222.186.175.8 attackbotsspam
Oct  8 09:41:18 s64-1 sshd[29995]: Failed password for root from 222.186.175.8 port 17054 ssh2
Oct  8 09:41:34 s64-1 sshd[29995]: error: maximum authentication attempts exceeded for root from 222.186.175.8 port 17054 ssh2 [preauth]
Oct  8 09:41:45 s64-1 sshd[29999]: Failed password for root from 222.186.175.8 port 20790 ssh2
...
2019-10-08 15:48:08
208.187.167.60 attackbots
$f2bV_matches
2019-10-08 16:14:11
51.68.192.106 attackspambots
$f2bV_matches
2019-10-08 15:37:15
109.66.56.143 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/109.66.56.143/ 
 IL - 1H : (12)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IL 
 NAME ASN : ASN8551 
 
 IP : 109.66.56.143 
 
 CIDR : 109.66.56.0/24 
 
 PREFIX COUNT : 3249 
 
 UNIQUE IP COUNT : 1550848 
 
 
 WYKRYTE ATAKI Z ASN8551 :  
  1H - 2 
  3H - 2 
  6H - 3 
 12H - 4 
 24H - 5 
 
 DateTime : 2019-10-08 05:54:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 16:09:03

Recently Reported IPs

155.93.117.136 255.214.167.244 105.7.190.146 210.15.143.144
54.252.212.79 133.54.142.173 97.8.23.94 81.18.197.180
5.249.0.2 202.25.80.217 241.147.2.4 195.150.194.7
135.0.185.17 173.176.39.57 59.18.46.167 129.63.158.247
12.244.33.148 96.195.64.233 42.191.225.247 42.109.228.54