Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: PACE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.138.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 71
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.138.97.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 17:45:50 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 97.138.130.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.138.130.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.177 attackspambots
Dec  2 02:43:00 vibhu-HP-Z238-Microtower-Workstation sshd\[27596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.177  user=root
Dec  2 02:43:02 vibhu-HP-Z238-Microtower-Workstation sshd\[27596\]: Failed password for root from 112.85.42.177 port 11215 ssh2
Dec  2 02:43:05 vibhu-HP-Z238-Microtower-Workstation sshd\[27596\]: Failed password for root from 112.85.42.177 port 11215 ssh2
Dec  2 02:43:09 vibhu-HP-Z238-Microtower-Workstation sshd\[27596\]: Failed password for root from 112.85.42.177 port 11215 ssh2
Dec  2 02:43:12 vibhu-HP-Z238-Microtower-Workstation sshd\[27596\]: Failed password for root from 112.85.42.177 port 11215 ssh2
...
2019-12-02 05:13:23
125.227.163.163 attackbots
" "
2019-12-02 05:25:46
162.144.123.107 attack
WordPress login Brute force / Web App Attack on client site.
2019-12-02 05:16:32
62.234.9.150 attackspam
Dec  1 12:18:52 TORMINT sshd\[25742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150  user=root
Dec  1 12:18:54 TORMINT sshd\[25742\]: Failed password for root from 62.234.9.150 port 41682 ssh2
Dec  1 12:21:28 TORMINT sshd\[25862\]: Invalid user gofron from 62.234.9.150
Dec  1 12:21:28 TORMINT sshd\[25862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.9.150
...
2019-12-02 05:11:07
122.166.237.117 attack
F2B jail: sshd. Time: 2019-12-01 18:41:10, Reported by: VKReport
2019-12-02 04:53:58
139.99.219.208 attackbots
Dec  1 21:38:54 MK-Soft-VM5 sshd[12816]: Failed password for root from 139.99.219.208 port 41400 ssh2
Dec  1 21:45:26 MK-Soft-VM5 sshd[12890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.219.208 
...
2019-12-02 05:35:52
61.155.238.121 attack
Dec  1 19:19:37 mail1 sshd\[7388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.238.121  user=root
Dec  1 19:19:38 mail1 sshd\[7388\]: Failed password for root from 61.155.238.121 port 38110 ssh2
Dec  1 19:30:01 mail1 sshd\[11999\]: Invalid user wilmschen from 61.155.238.121 port 44955
Dec  1 19:30:01 mail1 sshd\[11999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.238.121
Dec  1 19:30:03 mail1 sshd\[11999\]: Failed password for invalid user wilmschen from 61.155.238.121 port 44955 ssh2
...
2019-12-02 05:27:00
138.197.95.2 attack
WordPress login Brute force / Web App Attack on client site.
2019-12-02 05:09:54
112.85.42.173 attack
Dec  1 15:57:45 xentho sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Dec  1 15:57:47 xentho sshd[1076]: Failed password for root from 112.85.42.173 port 61524 ssh2
Dec  1 15:57:50 xentho sshd[1076]: Failed password for root from 112.85.42.173 port 61524 ssh2
Dec  1 15:57:45 xentho sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Dec  1 15:57:47 xentho sshd[1076]: Failed password for root from 112.85.42.173 port 61524 ssh2
Dec  1 15:57:50 xentho sshd[1076]: Failed password for root from 112.85.42.173 port 61524 ssh2
Dec  1 15:57:45 xentho sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Dec  1 15:57:47 xentho sshd[1076]: Failed password for root from 112.85.42.173 port 61524 ssh2
Dec  1 15:57:50 xentho sshd[1076]: Failed password for root from 112.85.42.173 po
...
2019-12-02 05:03:12
123.157.186.28 attackspam
SASL broute force
2019-12-02 05:11:32
216.218.206.121 attackbots
firewall-block, port(s): 50075/tcp
2019-12-02 05:08:24
209.97.146.3 attackbots
Lines containing failures of 209.97.146.3
Dec  1 14:31:40 beinglibertarian sshd[15186]: Did not receive identification string from 209.97.146.3 port 58886
Dec  1 14:33:13 beinglibertarian sshd[15220]: Invalid user ts3 from 209.97.146.3 port 40246
Dec  1 14:33:13 beinglibertarian sshd[15220]: Received disconnect from 209.97.146.3 port 40246:11: Normal Shutdown, Thank you for playing [preauth]
Dec  1 14:33:13 beinglibertarian sshd[15220]: Disconnected from invalid user ts3 209.97.146.3 port 40246 [preauth]
Dec  1 14:34:49 beinglibertarian sshd[15293]: Invalid user judge from 209.97.146.3 port 36698
Dec  1 14:34:49 beinglibertarian sshd[15293]: Received disconnect from 209.97.146.3 port 36698:11: Normal Shutdown, Thank you for playing [preauth]
Dec  1 14:34:49 beinglibertarian sshd[15293]: Disconnected from invalid user judge 209.97.146.3 port 36698 [preauth]
Dec  1 14:36:25 beinglibertarian sshd[15340]: Invalid user minerhub from 209.97.146.3 port 33148
Dec  1 14:36:25 bei........
------------------------------
2019-12-02 05:15:47
49.81.93.227 attackspambots
Brute force SMTP login attempts.
2019-12-02 05:33:15
106.12.190.104 attackbotsspam
Dec  1 21:08:34 ws26vmsma01 sshd[104860]: Failed password for root from 106.12.190.104 port 40534 ssh2
...
2019-12-02 05:29:38
49.49.241.125 attackbotsspam
Dec  1 19:13:23 MK-Soft-Root1 sshd[30500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.49.241.125 
Dec  1 19:13:24 MK-Soft-Root1 sshd[30500]: Failed password for invalid user temp from 49.49.241.125 port 19299 ssh2
...
2019-12-02 05:12:08

Recently Reported IPs

104.130.136.94 104.130.14.250 104.130.141.56 104.130.145.210
104.130.150.198 104.130.158.197 104.130.169.208 104.130.172.33
104.130.195.49 104.130.201.140 104.130.201.204 104.130.201.242
104.130.207.85 104.130.209.86 104.130.210.125 104.130.210.203
104.130.210.240 114.244.61.30 104.130.212.114 194.180.22.97