Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jacksonville

Region: Florida

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.48.122.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.48.122.130.			IN	A

;; AUTHORITY SECTION:
.			190	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041102 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 12 09:39:39 CST 2022
;; MSG SIZE  rcvd: 107
Host info
130.122.48.104.in-addr.arpa domain name pointer textbookdiscrimination.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.122.48.104.in-addr.arpa	name = textbookdiscrimination.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.183 attack
Sep 25 13:02:39 IngegnereFirenze sshd[21118]: Failed password for invalid user unlock from 195.54.160.183 port 26971 ssh2
...
2020-09-25 21:49:38
104.244.78.136 attackbotsspam
Invalid user admin from 104.244.78.136 port 53716
2020-09-25 21:39:51
52.252.109.221 attackspambots
Sep 25 15:13:05 melroy-server sshd[21596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.252.109.221 
Sep 25 15:13:07 melroy-server sshd[21596]: Failed password for invalid user admin from 52.252.109.221 port 62922 ssh2
...
2020-09-25 21:18:04
110.35.80.82 attack
Invalid user file from 110.35.80.82 port 60824
2020-09-25 21:31:27
188.234.247.110 attackbots
Invalid user zzz from 188.234.247.110 port 46764
2020-09-25 21:53:13
60.220.228.10 attackspam
Brute force blocker - service: proftpd1 - aantal: 56 - Thu Sep  6 09:15:15 2018
2020-09-25 21:40:22
180.117.97.161 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 180.117.97.161 (-): 5 in the last 3600 secs - Thu Sep  6 11:31:10 2018
2020-09-25 21:43:09
161.35.63.93 attackbotsspam
Invalid user ubnt from 161.35.63.93 port 41174
2020-09-25 21:38:20
119.45.250.197 attack
"fail2ban match"
2020-09-25 21:16:27
125.70.181.185 attackspam
Brute force blocker - service: proftpd1 - aantal: 154 - Thu Sep  6 08:45:15 2018
2020-09-25 21:38:43
107.173.27.189 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 107.173.27.189 (107-173-27-189-host.colocrossing.com): 5 in the last 3600 secs - Sat Sep  8 01:58:39 2018
2020-09-25 21:26:26
91.121.210.82 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 91.121.210.82 (FR/France/ns364683.ip-91-121-210.eu): 5 in the last 3600 secs - Thu Sep  6 15:59:18 2018
2020-09-25 21:34:25
116.75.110.248 attackspambots
Listed on    dnsbl-sorbs plus abuseat.org and zen-spamhaus   / proto=6  .  srcport=43091  .  dstport=23  .     (3637)
2020-09-25 21:43:43
189.217.19.236 attack
Honeypot attack, port: 445, PTR: customer-189-217-19-236.cablevision.net.mx.
2020-09-25 21:15:16
36.45.143.153 attackbotsspam
Brute force blocker - service: proftpd1 - aantal: 130 - Thu Sep  6 10:50:15 2018
2020-09-25 21:35:47

Recently Reported IPs

104.47.110.36 104.56.73.73 104.70.56.253 104.76.100.146
104.78.233.29 104.81.133.169 104.81.137.88 104.81.150.231
104.88.206.70 104.88.206.87 104.91.101.41 104.91.166.56
104.91.166.66 104.95.213.229 104.95.222.134 104.96.240.90
105.155.180.67 105.197.44.40 105.213.112.223 105.213.15.75