Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.141.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.141.234.		IN	A

;; AUTHORITY SECTION:
.			144	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 16:29:55 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 234.141.130.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.141.130.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.28.45.51 attack
blogonese.net 122.28.45.51 \[17/Jul/2019:18:38:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 122.28.45.51 \[17/Jul/2019:18:38:27 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4086 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-18 01:31:05
68.188.34.106 attackbotsspam
Trying to deliver email spam, but blocked by RBL
2019-07-18 02:22:39
54.37.69.113 attackbots
Jul 17 20:01:23 eventyay sshd[2477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.69.113
Jul 17 20:01:24 eventyay sshd[2477]: Failed password for invalid user hattori from 54.37.69.113 port 53492 ssh2
Jul 17 20:05:53 eventyay sshd[3552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.69.113
...
2019-07-18 02:13:03
103.16.62.66 attackspam
Looking for resource vulnerabilities
2019-07-18 01:57:27
84.123.13.17 attackbots
Attempted SSH login
2019-07-18 02:16:26
87.98.147.104 attackspambots
Jul 17 20:01:09 mail sshd\[25287\]: Invalid user tp from 87.98.147.104 port 47258
Jul 17 20:01:09 mail sshd\[25287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.147.104
Jul 17 20:01:10 mail sshd\[25287\]: Failed password for invalid user tp from 87.98.147.104 port 47258 ssh2
Jul 17 20:05:45 mail sshd\[25898\]: Invalid user cesar from 87.98.147.104 port 46152
Jul 17 20:05:45 mail sshd\[25898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.147.104
2019-07-18 02:22:13
187.44.113.33 attackspam
Jul 17 19:42:57 bouncer sshd\[20167\]: Invalid user test from 187.44.113.33 port 53366
Jul 17 19:42:57 bouncer sshd\[20167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.113.33 
Jul 17 19:42:59 bouncer sshd\[20167\]: Failed password for invalid user test from 187.44.113.33 port 53366 ssh2
...
2019-07-18 01:52:16
88.88.193.230 attack
2019-07-17T17:08:28.342194abusebot-4.cloudsearch.cf sshd\[4073\]: Invalid user sybase from 88.88.193.230 port 42623
2019-07-18 01:35:19
51.77.28.40 attack
Jul 17 19:58:57 vps647732 sshd[9270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.28.40
Jul 17 19:58:59 vps647732 sshd[9270]: Failed password for invalid user tf2 from 51.77.28.40 port 39924 ssh2
...
2019-07-18 02:03:23
153.36.236.234 attack
2019-07-17T17:16:55.535920abusebot-6.cloudsearch.cf sshd\[7369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
2019-07-18 01:45:59
180.124.4.4 attackbots
Brute force SMTP login attempts.
2019-07-18 02:06:29
86.241.181.41 attack
Honeypot attack, port: 23, PTR: lfbn-1-2571-41.w86-241.abo.wanadoo.fr.
2019-07-18 01:34:04
159.89.41.188 attackbotsspam
1563382227 - 07/17/2019 18:50:27 Host: 159.89.41.188/159.89.41.188 Port: 389 UDP Blocked
2019-07-18 02:21:14
185.236.201.234 attackbots
Chat Spam
2019-07-18 01:47:14
202.184.41.199 attackbots
Excessive Port-Scanning
2019-07-18 02:23:42

Recently Reported IPs

104.130.136.59 104.130.141.42 104.130.147.203 104.130.149.190
104.130.151.16 104.130.157.202 70.8.30.95 104.130.157.59
104.130.169.173 133.106.200.15 104.130.170.118 104.130.172.23
104.130.172.30 104.130.172.48 104.130.178.152 104.130.198.129
104.130.198.176 104.130.198.89 104.130.199.62 104.130.201.101