Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.139.98.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.139.98.244.			IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030600 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 15:56:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 244.98.139.130.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 130.139.98.244.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
212.68.208.120 attackbotsspam
Invalid user jboss from 212.68.208.120 port 56078
2019-10-18 17:22:39
69.36.182.100 attackbotsspam
2019-10-18T11:16:15.288744tmaserv sshd\[23805\]: Failed password for invalid user webmaster from 69.36.182.100 port 34520 ssh2
2019-10-18T12:19:03.736931tmaserv sshd\[26506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.36.182.100  user=root
2019-10-18T12:19:05.440753tmaserv sshd\[26506\]: Failed password for root from 69.36.182.100 port 59732 ssh2
2019-10-18T12:22:48.624428tmaserv sshd\[26720\]: Invalid user light from 69.36.182.100 port 41284
2019-10-18T12:22:48.627524tmaserv sshd\[26720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.36.182.100
2019-10-18T12:22:50.221652tmaserv sshd\[26720\]: Failed password for invalid user light from 69.36.182.100 port 41284 ssh2
...
2019-10-18 18:04:10
142.93.44.83 attackbots
Automatic report - XMLRPC Attack
2019-10-18 17:47:29
188.150.173.73 attackspam
Lines containing failures of 188.150.173.73 (max 1000)
Oct 17 08:13:06 localhost sshd[13493]: User r.r from 188.150.173.73 not allowed because listed in DenyUsers
Oct 17 08:13:06 localhost sshd[13493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.150.173.73  user=r.r
Oct 17 08:13:08 localhost sshd[13493]: Failed password for invalid user r.r from 188.150.173.73 port 44588 ssh2
Oct 17 08:13:08 localhost sshd[13493]: Received disconnect from 188.150.173.73 port 44588:11: Bye Bye [preauth]
Oct 17 08:13:08 localhost sshd[13493]: Disconnected from invalid user r.r 188.150.173.73 port 44588 [preauth]
Oct 17 08:21:33 localhost sshd[17701]: Invalid user vbox from 188.150.173.73 port 48614
Oct 17 08:21:33 localhost sshd[17701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.150.173.73 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.150.173.73
2019-10-18 17:43:04
151.40.227.130 attack
Automatic report - Port Scan Attack
2019-10-18 17:53:06
121.225.85.30 attackspam
Oct 18 08:38:34 ovpn sshd[20848]: Invalid user soporte from 121.225.85.30
Oct 18 08:38:34 ovpn sshd[20848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.225.85.30
Oct 18 08:38:36 ovpn sshd[20848]: Failed password for invalid user soporte from 121.225.85.30 port 43961 ssh2
Oct 18 08:38:36 ovpn sshd[20848]: Received disconnect from 121.225.85.30 port 43961:11: Bye Bye [preauth]
Oct 18 08:38:36 ovpn sshd[20848]: Disconnected from 121.225.85.30 port 43961 [preauth]
Oct 18 08:46:13 ovpn sshd[22317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.225.85.30  user=r.r
Oct 18 08:46:15 ovpn sshd[22317]: Failed password for r.r from 121.225.85.30 port 47816 ssh2
Oct 18 08:46:15 ovpn sshd[22317]: Received disconnect from 121.225.85.30 port 47816:11: Bye Bye [preauth]
Oct 18 08:46:15 ovpn sshd[22317]: Disconnected from 121.225.85.30 port 47816 [preauth]

........
-----------------------------------------------
https://www.blocklist
2019-10-18 17:55:19
31.163.151.99 attack
Fail2Ban Ban Triggered
2019-10-18 17:39:21
140.143.164.33 attackbots
$f2bV_matches
2019-10-18 17:32:09
124.156.185.149 attackspam
Oct 18 09:18:35 web8 sshd\[12010\]: Invalid user test1 from 124.156.185.149
Oct 18 09:18:35 web8 sshd\[12010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.185.149
Oct 18 09:18:38 web8 sshd\[12010\]: Failed password for invalid user test1 from 124.156.185.149 port 42724 ssh2
Oct 18 09:22:35 web8 sshd\[13832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.185.149  user=root
Oct 18 09:22:37 web8 sshd\[13832\]: Failed password for root from 124.156.185.149 port 22754 ssh2
2019-10-18 17:33:29
81.29.211.228 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-18 17:57:56
178.62.214.85 attackspambots
Oct 18 08:51:52 ArkNodeAT sshd\[31683\]: Invalid user 123456 from 178.62.214.85
Oct 18 08:51:52 ArkNodeAT sshd\[31683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.214.85
Oct 18 08:51:54 ArkNodeAT sshd\[31683\]: Failed password for invalid user 123456 from 178.62.214.85 port 34139 ssh2
2019-10-18 17:51:44
58.221.204.114 attack
Oct 18 07:39:14 unicornsoft sshd\[5931\]: Invalid user user1 from 58.221.204.114
Oct 18 07:39:14 unicornsoft sshd\[5931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114
Oct 18 07:39:16 unicornsoft sshd\[5931\]: Failed password for invalid user user1 from 58.221.204.114 port 35266 ssh2
2019-10-18 17:32:43
148.70.60.190 attackspambots
Oct 18 07:21:13 ms-srv sshd[63291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.60.190  user=root
Oct 18 07:21:15 ms-srv sshd[63291]: Failed password for invalid user root from 148.70.60.190 port 58442 ssh2
2019-10-18 17:24:55
105.235.193.94 attackbots
Oct 17 21:47:41 mail postfix/postscreen[205873]: PREGREET 15 after 2.4 from [105.235.193.94]:54552: EHLO lirus.it

...
2019-10-18 17:25:48
114.67.80.39 attackspam
Oct 18 07:04:54 www sshd\[193153\]: Invalid user com from 114.67.80.39
Oct 18 07:04:54 www sshd\[193153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.39
Oct 18 07:04:55 www sshd\[193153\]: Failed password for invalid user com from 114.67.80.39 port 34952 ssh2
...
2019-10-18 17:36:07

Recently Reported IPs

117.197.119.221 117.197.119.222 117.197.119.234 169.145.161.254
117.197.119.237 117.197.119.238 68.102.183.252 117.197.119.243
211.170.56.71 117.197.119.247 117.197.119.252 117.197.13.236
117.197.15.27 117.197.40.211 117.197.42.198 117.197.42.2
117.197.42.200 117.197.42.205 117.197.42.21 117.197.42.212