Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: PACE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.198.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.198.49.			IN	A

;; AUTHORITY SECTION:
.			570	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 02:08:31 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 49.198.130.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.198.130.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.61.43.133 attack
Honeypot attack, port: 23, PTR: host-190-61-43-133.ufinet.com.co.
2019-12-28 06:55:47
45.33.77.110 attack
Automatic report - Port Scan
2019-12-28 07:28:38
177.73.248.35 attackspam
Invalid user test from 177.73.248.35 port 57038
2019-12-28 07:30:36
163.172.36.146 attack
2019-12-27T22:53:42.250837shield sshd\[26583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.36.146  user=root
2019-12-27T22:53:43.589287shield sshd\[26583\]: Failed password for root from 163.172.36.146 port 46604 ssh2
2019-12-27T22:56:38.014116shield sshd\[27193\]: Invalid user inuzuka from 163.172.36.146 port 36440
2019-12-27T22:56:38.019769shield sshd\[27193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.36.146
2019-12-27T22:56:40.186589shield sshd\[27193\]: Failed password for invalid user inuzuka from 163.172.36.146 port 36440 ssh2
2019-12-28 07:18:31
141.98.9.222 attack
Detected by Maltrail
2019-12-28 07:06:15
106.75.87.119 attack
Dec 27 23:56:40 163-172-32-151 sshd[18264]: Invalid user shanley from 106.75.87.119 port 38576
...
2019-12-28 07:17:24
185.209.0.32 attackspam
12/27/2019-18:09:50.071844 185.209.0.32 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-28 07:13:39
94.73.194.12 attackspam
michaelklotzbier.de 94.73.194.12 [27/Dec/2019:23:57:01 +0100] "POST /wp-login.php HTTP/1.1" 200 6418 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
michaelklotzbier.de 94.73.194.12 [27/Dec/2019:23:57:02 +0100] "POST /wp-login.php HTTP/1.1" 200 6378 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-28 07:04:00
157.245.224.89 attack
Wordpress Admin Login attack
2019-12-28 07:03:34
60.19.64.10 attackspambots
Dec 27 17:56:22 web1 postfix/smtpd[18931]: warning: unknown[60.19.64.10]: SASL LOGIN authentication failed: authentication failure
...
2019-12-28 07:28:10
129.211.12.96 attack
Dec 27 18:13:17 plusreed sshd[31236]: Invalid user admin from 129.211.12.96
...
2019-12-28 07:15:31
93.148.209.74 attackbotsspam
Invalid user baldick from 93.148.209.74 port 35214
2019-12-28 07:11:57
185.184.79.30 attackbots
Fail2Ban Ban Triggered
2019-12-28 06:56:33
103.52.135.48 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 06:53:54
123.206.174.21 attack
Dec 28 00:28:27 lnxmysql61 sshd[26884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.21
Dec 28 00:28:27 lnxmysql61 sshd[26884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.21
2019-12-28 07:32:17

Recently Reported IPs

104.130.194.134 104.130.201.22 104.130.229.153 104.130.254.88
104.130.26.228 104.130.6.224 104.131.109.148 104.131.11.60
104.131.116.175 104.131.117.217 104.131.12.189 104.131.123.106
104.131.125.205 104.131.190.213 104.131.2.31 104.131.238.28
104.131.24.0 104.131.3.1 104.131.30.231 104.131.35.15