Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.207.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.207.18.			IN	A

;; AUTHORITY SECTION:
.			571	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 02:48:42 CST 2022
;; MSG SIZE  rcvd: 107
Host info
18.207.130.104.in-addr.arpa domain name pointer www.luandapoliticalobserver.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.207.130.104.in-addr.arpa	name = www.luandapoliticalobserver.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.86.167.4 attack
sae-Joomla Admin : try to force the door...
2020-04-23 06:55:58
119.112.88.101 attackspam
Automatic report - Port Scan Attack
2020-04-23 07:20:31
46.142.12.245 attack
IP blocked
2020-04-23 07:24:35
103.145.12.52 attackspam
[2020-04-22 18:50:58] NOTICE[1170][C-00003b11] chan_sip.c: Call from '' (103.145.12.52:59211) to extension '901146313115993' rejected because extension not found in context 'public'.
[2020-04-22 18:50:58] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-22T18:50:58.337-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146313115993",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.52/59211",ACLName="no_extension_match"
[2020-04-22 18:52:59] NOTICE[1170][C-00003b16] chan_sip.c: Call from '' (103.145.12.52:59809) to extension '801146313115993' rejected because extension not found in context 'public'.
[2020-04-22 18:52:59] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-22T18:52:59.289-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146313115993",SessionID="0x7f6c0824ccd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
...
2020-04-23 07:17:05
177.202.118.44 attackspam
proto=tcp  .  spt=44850  .  dpt=25  .     Found on   Blocklist de       (393)
2020-04-23 07:04:41
111.229.167.10 attackspam
prod11
...
2020-04-23 06:59:31
159.89.3.128 attackspambots
Apr 23 00:05:38 ns382633 sshd\[14658\]: Invalid user zj from 159.89.3.128 port 48650
Apr 23 00:05:38 ns382633 sshd\[14658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.3.128
Apr 23 00:05:40 ns382633 sshd\[14658\]: Failed password for invalid user zj from 159.89.3.128 port 48650 ssh2
Apr 23 00:16:38 ns382633 sshd\[16549\]: Invalid user test from 159.89.3.128 port 48976
Apr 23 00:16:38 ns382633 sshd\[16549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.3.128
2020-04-23 06:52:50
51.38.39.222 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-04-23 07:25:38
115.84.91.211 attackbotsspam
proto=tcp  .  spt=58880  .  dpt=993  .  src=115.84.91.211  .  dst=xx.xx.4.1  .     Found on   Blocklist de       (398)
2020-04-23 06:50:11
172.245.13.69 attackspambots
$f2bV_matches
2020-04-23 07:15:06
180.76.53.114 attack
Apr 22 19:15:12 NPSTNNYC01T sshd[466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.53.114
Apr 22 19:15:14 NPSTNNYC01T sshd[466]: Failed password for invalid user sftpuser from 180.76.53.114 port 35384 ssh2
Apr 22 19:19:12 NPSTNNYC01T sshd[893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.53.114
...
2020-04-23 07:23:35
80.211.78.82 attackbotsspam
SSH Brute-Forcing (server1)
2020-04-23 06:57:16
194.44.160.246 attack
proto=tcp  .  spt=52344  .  dpt=25  .     Found on   Dark List de      (396)
2020-04-23 06:57:32
139.59.43.159 attackbotsspam
" "
2020-04-23 07:07:01
178.128.204.192 attack
178.128.204.192 - - [22/Apr/2020:22:13:33 +0200] "GET /wp-login.php HTTP/1.1" 200 6435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.204.192 - - [22/Apr/2020:22:13:35 +0200] "POST /wp-login.php HTTP/1.1" 200 6746 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.204.192 - - [22/Apr/2020:22:13:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-23 06:51:59

Recently Reported IPs

104.130.146.12 104.130.210.127 104.130.205.106 104.130.2.252
104.130.201.157 104.130.216.18 104.130.239.50 104.130.255.55
104.130.253.245 104.130.35.216 104.130.9.219 104.130.41.52
104.130.73.44 104.130.70.30 104.131.104.0 104.130.66.220
104.130.6.162 104.131.115.18 104.131.115.61 104.131.120.190