Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.130.229.34 attackspambots
$f2bV_matches
2020-08-25 02:49:45
104.130.229.193 attack
B: ssh repeated attack for invalid user
2020-03-28 05:45:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.229.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.229.150.		IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:31:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
150.229.130.104.in-addr.arpa domain name pointer www.ultimatewindowssecurity.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.229.130.104.in-addr.arpa	name = www.ultimatewindowssecurity.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.68.177.237 attack
Feb  9 15:26:06 XXX sshd[35312]: Invalid user pr from 210.68.177.237 port 43180
2020-02-10 01:28:24
156.204.201.57 attackbotsspam
23/tcp
[2020-02-09]1pkt
2020-02-10 00:59:05
123.206.23.188 attack
Feb  9 15:27:26 silence02 sshd[3569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.23.188
Feb  9 15:27:28 silence02 sshd[3569]: Failed password for invalid user nyi from 123.206.23.188 port 36226 ssh2
Feb  9 15:32:32 silence02 sshd[3923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.23.188
2020-02-10 01:27:26
171.234.152.135 attackbots
1581255236 - 02/09/2020 14:33:56 Host: 171.234.152.135/171.234.152.135 Port: 445 TCP Blocked
2020-02-10 01:38:36
191.7.1.36 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-10 01:25:51
185.209.0.32 attack
02/09/2020-18:03:01.589061 185.209.0.32 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-10 01:15:19
105.155.12.240 attackbots
22/tcp 8291/tcp...
[2020-02-09]4pkt,2pt.(tcp)
2020-02-10 01:06:31
49.88.112.55 attackbotsspam
Feb  9 18:08:25 vpn01 sshd[29360]: Failed password for root from 49.88.112.55 port 22809 ssh2
Feb  9 18:08:34 vpn01 sshd[29360]: Failed password for root from 49.88.112.55 port 22809 ssh2
...
2020-02-10 01:09:53
51.15.165.211 attack
Feb  9 14:34:49 MK-Soft-VM6 sshd[25635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.165.211 
Feb  9 14:34:51 MK-Soft-VM6 sshd[25635]: Failed password for invalid user bqd from 51.15.165.211 port 37150 ssh2
...
2020-02-10 01:02:40
128.70.240.105 attack
20/2/9@08:34:06: FAIL: Alarm-Network address from=128.70.240.105
...
2020-02-10 01:26:50
105.247.243.236 attackspam
Feb  9 05:39:33 php1 sshd\[2692\]: Invalid user dxc from 105.247.243.236
Feb  9 05:39:33 php1 sshd\[2692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.247.243.236
Feb  9 05:39:35 php1 sshd\[2692\]: Failed password for invalid user dxc from 105.247.243.236 port 47404 ssh2
Feb  9 05:41:44 php1 sshd\[2832\]: Invalid user kht from 105.247.243.236
Feb  9 05:41:44 php1 sshd\[2832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.247.243.236
2020-02-10 01:24:27
41.170.84.122 attackbots
Feb  9 18:35:49 legacy sshd[9720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122
Feb  9 18:35:51 legacy sshd[9720]: Failed password for invalid user eva from 41.170.84.122 port 32978 ssh2
Feb  9 18:39:40 legacy sshd[9898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.84.122
...
2020-02-10 01:41:15
80.66.81.143 attackspambots
Feb  9 18:08:38 relay postfix/smtpd\[23033\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  9 18:09:10 relay postfix/smtpd\[26766\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  9 18:09:30 relay postfix/smtpd\[23033\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  9 18:14:04 relay postfix/smtpd\[23595\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  9 18:14:23 relay postfix/smtpd\[23533\]: warning: unknown\[80.66.81.143\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-10 01:21:55
222.186.30.248 attackbots
Feb  9 17:59:39 localhost sshd\[30578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.248  user=root
Feb  9 17:59:40 localhost sshd\[30578\]: Failed password for root from 222.186.30.248 port 32891 ssh2
Feb  9 17:59:42 localhost sshd\[30578\]: Failed password for root from 222.186.30.248 port 32891 ssh2
2020-02-10 01:12:54
112.85.42.180 attackspam
v+ssh-bruteforce
2020-02-10 01:32:10

Recently Reported IPs

104.130.201.243 104.130.211.163 104.130.246.14 104.130.222.53
104.21.63.140 104.130.246.39 104.130.210.251 104.130.201.120
104.130.26.195 104.130.250.96 104.130.52.99 104.130.4.109
104.130.6.236 104.130.254.73 104.130.42.125 104.130.50.189
104.130.53.224 104.130.62.29 104.130.67.111 103.118.152.38