Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       130.12.180.0 - 130.12.183.255
CIDR:           130.12.180.0/22
NetName:        PRIVATE-NETWORK
NetHandle:      NET-130-12-180-0-1
Parent:         NET130 (NET-130-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Netiface LLC (NL-846)
RegDate:        2025-10-08
Updated:        2025-12-20
Comment:        PRIVATE-NETWORK
Ref:            https://rdap.arin.net/registry/ip/130.12.180.0


OrgName:        Netiface LLC
OrgId:          NL-846
Address:        6844 Bardstown Rd
City:           Louisvile
StateProv:      KY
PostalCode:     40291
Country:        US
RegDate:        2024-04-05
Updated:        2025-05-18
Ref:            https://rdap.arin.net/registry/entity/NL-846


OrgTechHandle: NETIF2-ARIN
OrgTechName:   Netiface NOC
OrgTechPhone:  +1-216-245-7465 
OrgTechEmail:  abuse@abusehandler.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETIF2-ARIN

OrgAbuseHandle: NETIF2-ARIN
OrgAbuseName:   Netiface NOC
OrgAbusePhone:  +1-216-245-7465 
OrgAbuseEmail:  abuse@abusehandler.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETIF2-ARIN

# end


# start

NetRange:       130.12.180.0 - 130.12.180.255
CIDR:           130.12.180.0/24
NetName:        LANEDONET
NetHandle:      NET-130-12-180-0-2
Parent:         PRIVATE-NETWORK (NET-130-12-180-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   Virtualine Technologies (SITL-8)
RegDate:        2025-12-19
Updated:        2025-12-19
Comment:        Abuse email: abuse@virtualine.org
Ref:            https://rdap.arin.net/registry/ip/130.12.180.0


OrgName:        Virtualine Technologies
OrgId:          SITL-8
Address:        71-75 Shelton Street, Covent Garden, London, United Kingdom, WC2H 9JQ
City:           London
StateProv:      
PostalCode:     WC2H 9JQ
Country:        GB
RegDate:        2024-09-05
Updated:        2024-09-11
Comment:        Report your complaint:
Comment:        abuse@virtualine.org
Ref:            https://rdap.arin.net/registry/entity/SITL-8


OrgTechHandle: VAD36-ARIN
OrgTechName:   VIRTUALINE ABUSE DEPARTMENT
OrgTechPhone:  +447458164463 
OrgTechEmail:  abuse@virtualine.org
OrgTechRef:    https://rdap.arin.net/registry/entity/VAD36-ARIN

OrgAbuseHandle: VAD36-ARIN
OrgAbuseName:   VIRTUALINE ABUSE DEPARTMENT
OrgAbusePhone:  +447458164463 
OrgAbuseEmail:  abuse@virtualine.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/VAD36-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.12.180.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.12.180.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012501 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 26 08:00:42 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 108.180.12.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.180.12.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.44.208.107 attackspambots
Aug 18 11:28:22 onepixel sshd[3969100]: Invalid user larry from 177.44.208.107 port 42578
Aug 18 11:28:22 onepixel sshd[3969100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.44.208.107 
Aug 18 11:28:22 onepixel sshd[3969100]: Invalid user larry from 177.44.208.107 port 42578
Aug 18 11:28:24 onepixel sshd[3969100]: Failed password for invalid user larry from 177.44.208.107 port 42578 ssh2
Aug 18 11:32:18 onepixel sshd[3971301]: Invalid user guest from 177.44.208.107 port 56800
2020-08-18 19:49:18
61.185.114.130 attackspam
Aug 18 07:53:00 santamaria sshd\[9564\]: Invalid user minecraft from 61.185.114.130
Aug 18 07:53:00 santamaria sshd\[9564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130
Aug 18 07:53:02 santamaria sshd\[9564\]: Failed password for invalid user minecraft from 61.185.114.130 port 60178 ssh2
...
2020-08-18 20:02:54
103.44.248.87 attackspam
Invalid user zunwen from 103.44.248.87 port 60314
2020-08-18 20:11:01
84.144.87.5 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-18 20:13:47
181.48.120.220 attack
Aug 18 11:54:42 vps-51d81928 sshd[707513]: Failed password for root from 181.48.120.220 port 26370 ssh2
Aug 18 11:59:17 vps-51d81928 sshd[707568]: Invalid user teamspeak from 181.48.120.220 port 38874
Aug 18 11:59:17 vps-51d81928 sshd[707568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.120.220 
Aug 18 11:59:17 vps-51d81928 sshd[707568]: Invalid user teamspeak from 181.48.120.220 port 38874
Aug 18 11:59:18 vps-51d81928 sshd[707568]: Failed password for invalid user teamspeak from 181.48.120.220 port 38874 ssh2
...
2020-08-18 20:17:41
183.250.129.50 attackbotsspam
Port Scan
...
2020-08-18 19:46:08
149.202.130.96 attackbots
Aug 18 11:29:29 pornomens sshd\[4733\]: Invalid user jesa from 149.202.130.96 port 33662
Aug 18 11:29:29 pornomens sshd\[4733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.130.96
Aug 18 11:29:31 pornomens sshd\[4733\]: Failed password for invalid user jesa from 149.202.130.96 port 33662 ssh2
...
2020-08-18 19:49:36
119.235.19.66 attack
Aug 17 22:03:32 dignus sshd[31034]: Invalid user cdsmgr from 119.235.19.66 port 53887
Aug 17 22:03:32 dignus sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.19.66
Aug 17 22:03:34 dignus sshd[31034]: Failed password for invalid user cdsmgr from 119.235.19.66 port 53887 ssh2
Aug 17 22:05:31 dignus sshd[31300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.19.66  user=root
Aug 17 22:05:33 dignus sshd[31300]: Failed password for root from 119.235.19.66 port 38126 ssh2
...
2020-08-18 19:39:15
125.137.57.93 attackbots
Automatic report - Port Scan Attack
2020-08-18 19:40:44
85.209.0.252 attackbotsspam
SSH login attempts.
2020-08-18 20:15:53
49.77.182.249 attackspam
2020-08-18T12:30:30.946682v22018076590370373 sshd[19472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.77.182.249  user=root
2020-08-18T12:30:32.818371v22018076590370373 sshd[19472]: Failed password for root from 49.77.182.249 port 4424 ssh2
2020-08-18T12:33:29.620656v22018076590370373 sshd[7264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.77.182.249  user=root
2020-08-18T12:33:31.733170v22018076590370373 sshd[7264]: Failed password for root from 49.77.182.249 port 3535 ssh2
2020-08-18T12:52:08.196171v22018076590370373 sshd[2747]: Invalid user vserver from 49.77.182.249 port 1452
...
2020-08-18 20:04:22
213.202.233.100 attack
18.08.2020 09:48:14 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-08-18 19:41:39
95.0.185.19 attackspam
20/8/17@23:47:34: FAIL: Alarm-Network address from=95.0.185.19
20/8/17@23:47:34: FAIL: Alarm-Network address from=95.0.185.19
...
2020-08-18 19:56:05
35.229.141.62 attack
Invalid user ash from 35.229.141.62 port 37858
2020-08-18 20:04:37
92.118.160.49 attack
TCP port : 3390; UDP port : 5632
2020-08-18 19:53:18

Recently Reported IPs

111.201.247.66 54.224.229.32 162.216.149.66 180.153.236.156
180.153.236.134 87.152.151.129 65.2.19.185 54.196.33.20
3.85.125.1 18.215.232.158 3.249.187.155 61.228.229.69
91.196.152.231 91.196.152.225 14.213.11.191 64.227.80.5
220.177.46.5 20.168.99.52 162.211.121.72 60.188.11.123