Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.130.195.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36134
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.130.195.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 17:50:19 CST 2019
;; MSG SIZE  rcvd: 118
Host info
14.195.130.122.in-addr.arpa domain name pointer flh2-122-130-195-14.tky.mesh.ad.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
14.195.130.122.in-addr.arpa	name = flh2-122-130-195-14.tky.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.52.26.242 attackbots
proto=tcp  .  spt=44268  .  dpt=25  .     (listed on Blocklist de  Aug 01)     (7)
2019-08-02 15:20:53
98.209.233.237 attackbots
Aug  2 03:17:26 www1 sshd\[4168\]: Invalid user mc from 98.209.233.237Aug  2 03:17:28 www1 sshd\[4168\]: Failed password for invalid user mc from 98.209.233.237 port 37558 ssh2Aug  2 03:21:42 www1 sshd\[4677\]: Invalid user teste from 98.209.233.237Aug  2 03:21:44 www1 sshd\[4677\]: Failed password for invalid user teste from 98.209.233.237 port 60170 ssh2Aug  2 03:26:02 www1 sshd\[5184\]: Invalid user ferari from 98.209.233.237Aug  2 03:26:04 www1 sshd\[5184\]: Failed password for invalid user ferari from 98.209.233.237 port 54438 ssh2
...
2019-08-02 14:58:16
202.91.89.164 attackbotsspam
proto=tcp  .  spt=60898  .  dpt=25  .     (listed on Blocklist de  Aug 01)     (19)
2019-08-02 14:53:57
125.124.167.213 attackspam
Aug  2 06:39:21 w sshd[1270]: Invalid user kevin from 125.124.167.213
Aug  2 06:39:21 w sshd[1270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.167.213 
Aug  2 06:39:23 w sshd[1270]: Failed password for invalid user kevin from 125.124.167.213 port 53118 ssh2
Aug  2 06:39:23 w sshd[1270]: Received disconnect from 125.124.167.213: 11: Bye Bye [preauth]
Aug  2 07:01:37 w sshd[1441]: Connection closed by 125.124.167.213 [preauth]
Aug  2 07:04:43 w sshd[1454]: Invalid user view from 125.124.167.213
Aug  2 07:04:43 w sshd[1454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.167.213 
Aug  2 07:04:44 w sshd[1454]: Failed password for invalid user view from 125.124.167.213 port 33494 ssh2
Aug  2 07:04:44 w sshd[1454]: Received disconnect from 125.124.167.213: 11: Bye Bye [preauth]
Aug  2 07:07:59 w sshd[1468]: Invalid user linux1 from 125.124.167.213
Aug  2 07:07:59 w sshd[1468]........
-------------------------------
2019-08-02 14:44:06
203.217.1.13 attackbotsspam
Unauthorised access (Aug  2) SRC=203.217.1.13 LEN=40 TTL=241 ID=48319 TCP DPT=445 WINDOW=1024 SYN
2019-08-02 15:15:47
94.124.193.242 attackspam
proto=tcp  .  spt=38891  .  dpt=25  .     (listed on Blocklist de  Aug 01)     (18)
2019-08-02 14:56:14
119.146.145.104 attackbots
Invalid user usbmuxd from 119.146.145.104 port 2569
2019-08-02 14:27:44
35.0.127.52 attackspam
[ssh] SSH attack
2019-08-02 14:23:45
192.81.216.31 attack
Aug  2 03:20:29 [host] sshd[3768]: Invalid user teste from 192.81.216.31
Aug  2 03:20:29 [host] sshd[3768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.216.31
Aug  2 03:20:31 [host] sshd[3768]: Failed password for invalid user teste from 192.81.216.31 port 47064 ssh2
2019-08-02 14:26:34
194.88.239.92 attackspambots
Aug  2 06:16:41 localhost sshd\[19191\]: Invalid user admin from 194.88.239.92 port 55565
Aug  2 06:16:41 localhost sshd\[19191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.88.239.92
Aug  2 06:16:43 localhost sshd\[19191\]: Failed password for invalid user admin from 194.88.239.92 port 55565 ssh2
2019-08-02 14:48:30
106.75.8.129 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-02 15:12:58
91.121.217.23 attackspambots
/var/log/messages:Aug  1 07:03:54 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1564643034.568:131595): pid=4879 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4880 suid=74 rport=62467 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=91.121.217.23 terminal=? res=success'
/var/log/messages:Aug  1 07:03:54 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1564643034.571:131596): pid=4879 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=4880 suid=74 rport=62467 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=91.121.217.23 terminal=? res=success'
/var/log/messages:Aug  1 07:03:55 sanyalnet-cloud-vps fail2ban.filter[5325]: INFO [sshd]........
-------------------------------
2019-08-02 14:37:31
190.225.135.187 attackbotsspam
3389BruteforceFW22
2019-08-02 14:54:36
85.234.37.114 attackbots
Brute force attempt
2019-08-02 15:15:28
187.162.51.224 attackbots
Automatic report - Port Scan Attack
2019-08-02 14:46:39

Recently Reported IPs

57.143.168.250 116.153.100.102 6.3.225.91 146.44.42.187
168.117.171.3 113.89.19.23 0.55.245.202 76.114.150.186
127.101.189.24 164.106.99.32 145.106.123.42 154.20.51.250
111.125.208.90 221.69.9.132 162.114.160.89 94.244.142.78
63.17.217.224 72.206.73.55 57.139.106.14 180.70.120.40