Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Vodafone NRW GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
SSH Invalid Login
2020-08-25 06:55:29
attackspam
frenzy
2020-08-15 13:04:05
attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 20:38:27
attackspambots
Aug  2 20:05:17 sachi sshd\[8204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97  user=root
Aug  2 20:05:19 sachi sshd\[8204\]: Failed password for root from 130.180.66.97 port 44852 ssh2
Aug  2 20:09:56 sachi sshd\[8622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97  user=root
Aug  2 20:09:58 sachi sshd\[8622\]: Failed password for root from 130.180.66.97 port 46732 ssh2
Aug  2 20:14:32 sachi sshd\[8967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97  user=root
2020-08-03 14:31:31
attack
Jul 15 08:57:00 askasleikir sshd[135430]: Failed password for invalid user upload from 130.180.66.97 port 54468 ssh2
Jul 15 09:06:12 askasleikir sshd[135463]: Failed password for invalid user document from 130.180.66.97 port 35932 ssh2
Jul 15 09:14:13 askasleikir sshd[135503]: Failed password for invalid user zzx from 130.180.66.97 port 53050 ssh2
2020-07-15 22:47:36
attackbots
Jul 10 16:39:48 XXXXXX sshd[57719]: Invalid user jinhaoxuan from 130.180.66.97 port 57954
2020-07-11 05:03:04
attack
Jul  4 20:16:48 lukav-desktop sshd\[28270\]: Invalid user rr from 130.180.66.97
Jul  4 20:16:48 lukav-desktop sshd\[28270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97
Jul  4 20:16:50 lukav-desktop sshd\[28270\]: Failed password for invalid user rr from 130.180.66.97 port 52870 ssh2
Jul  4 20:21:41 lukav-desktop sshd\[28344\]: Invalid user user5 from 130.180.66.97
Jul  4 20:21:41 lukav-desktop sshd\[28344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97
2020-07-05 02:25:06
attackspambots
May 23 20:14:15 ws25vmsma01 sshd[63506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.97
May 23 20:14:16 ws25vmsma01 sshd[63506]: Failed password for invalid user avk from 130.180.66.97 port 33218 ssh2
...
2020-05-24 06:00:50
attackbotsspam
Bruteforce detected by fail2ban
2020-05-07 18:09:54
attackspam
Invalid user vj from 130.180.66.97 port 36166
2020-05-01 12:12:29
attack
2020-04-24T03:49:05.625680randservbullet-proofcloud-66.localdomain sshd[7018]: Invalid user ansible from 130.180.66.97 port 55080
2020-04-24T03:49:05.630032randservbullet-proofcloud-66.localdomain sshd[7018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-97.unitymedia.biz
2020-04-24T03:49:05.625680randservbullet-proofcloud-66.localdomain sshd[7018]: Invalid user ansible from 130.180.66.97 port 55080
2020-04-24T03:49:07.429324randservbullet-proofcloud-66.localdomain sshd[7018]: Failed password for invalid user ansible from 130.180.66.97 port 55080 ssh2
...
2020-04-24 18:03:37
attack
" "
2020-04-18 17:04:56
attackspam
Apr  9 18:41:05 mailserver sshd\[385\]: Invalid user test from 130.180.66.97
...
2020-04-10 05:32:50
attackspam
Apr  4 03:32:35 taivassalofi sshd[171027]: Failed password for root from 130.180.66.97 port 43834 ssh2
...
2020-04-04 08:48:55
Comments on same subnet:
IP Type Details Datetime
130.180.66.98 attackbots
fail2ban
2020-03-28 17:24:02
130.180.66.98 attackbots
(sshd) Failed SSH login from 130.180.66.98 (DE/Germany/b2b-130-180-66-98.unitymedia.biz): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  9 07:03:42 amsweb01 sshd[6596]: Failed password for root from 130.180.66.98 port 48792 ssh2
Mar  9 07:27:18 amsweb01 sshd[8719]: Failed password for root from 130.180.66.98 port 50324 ssh2
Mar  9 07:40:53 amsweb01 sshd[9914]: Failed password for root from 130.180.66.98 port 38504 ssh2
Mar  9 07:51:51 amsweb01 sshd[10862]: Invalid user phpmy from 130.180.66.98 port 54910
Mar  9 07:51:52 amsweb01 sshd[10862]: Failed password for invalid user phpmy from 130.180.66.98 port 54910 ssh2
2020-03-09 15:42:40
130.180.66.98 attackbotsspam
Feb 26 03:31:27 tdfoods sshd\[10134\]: Invalid user xor from 130.180.66.98
Feb 26 03:31:27 tdfoods sshd\[10134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz
Feb 26 03:31:28 tdfoods sshd\[10134\]: Failed password for invalid user xor from 130.180.66.98 port 48186 ssh2
Feb 26 03:38:12 tdfoods sshd\[10700\]: Invalid user frappe from 130.180.66.98
Feb 26 03:38:12 tdfoods sshd\[10700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz
2020-02-26 22:14:54
130.180.66.98 attack
Feb 26 02:51:31 sso sshd[31892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
Feb 26 02:51:33 sso sshd[31892]: Failed password for invalid user cpaneleximscanner from 130.180.66.98 port 36598 ssh2
...
2020-02-26 10:01:15
130.180.66.98 attack
Invalid user uno85 from 130.180.66.98 port 42088
2020-02-22 08:13:38
130.180.66.98 attackspam
Automatic report - Banned IP Access
2020-02-20 23:53:58
130.180.66.98 attackbotsspam
Feb 15 18:58:21 legacy sshd[4532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
Feb 15 18:58:22 legacy sshd[4532]: Failed password for invalid user xerox123 from 130.180.66.98 port 56332 ssh2
Feb 15 19:03:50 legacy sshd[4790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
...
2020-02-16 02:38:18
130.180.66.98 attack
$f2bV_matches
2020-01-13 03:08:36
130.180.66.98 attack
Unauthorized connection attempt detected from IP address 130.180.66.98 to port 2220 [J]
2020-01-08 14:12:50
130.180.66.98 attackbotsspam
2019-12-24T07:24:21.257675vps751288.ovh.net sshd\[16633\]: Invalid user 1921 from 130.180.66.98 port 45114
2019-12-24T07:24:21.265718vps751288.ovh.net sshd\[16633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz
2019-12-24T07:24:23.065626vps751288.ovh.net sshd\[16633\]: Failed password for invalid user 1921 from 130.180.66.98 port 45114 ssh2
2019-12-24T07:30:15.728921vps751288.ovh.net sshd\[16671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=b2b-130-180-66-98.unitymedia.biz  user=root
2019-12-24T07:30:17.125250vps751288.ovh.net sshd\[16671\]: Failed password for root from 130.180.66.98 port 49762 ssh2
2019-12-24 14:56:10
130.180.66.98 attackbotsspam
Dec 22 10:55:40 XXX sshd[29853]: Invalid user rpm from 130.180.66.98 port 36632
2019-12-22 22:10:10
130.180.66.98 attack
2019-12-09T01:04:37.774940  sshd[23858]: Invalid user ident from 130.180.66.98 port 57730
2019-12-09T01:04:37.789139  sshd[23858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
2019-12-09T01:04:37.774940  sshd[23858]: Invalid user ident from 130.180.66.98 port 57730
2019-12-09T01:04:39.509297  sshd[23858]: Failed password for invalid user ident from 130.180.66.98 port 57730 ssh2
2019-12-09T01:12:25.167726  sshd[23974]: Invalid user guest from 130.180.66.98 port 48344
...
2019-12-09 08:50:00
130.180.66.98 attackbotsspam
Dec  8 09:46:03 ny01 sshd[13010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
Dec  8 09:46:04 ny01 sshd[13010]: Failed password for invalid user lynn from 130.180.66.98 port 42516 ssh2
Dec  8 09:53:44 ny01 sshd[13860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
2019-12-09 02:41:24
130.180.66.98 attackbotsspam
Nov 30 13:36:59 MK-Soft-VM7 sshd[31390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98 
Nov 30 13:37:01 MK-Soft-VM7 sshd[31390]: Failed password for invalid user uekusa from 130.180.66.98 port 35794 ssh2
...
2019-11-30 20:54:59
130.180.66.98 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98  user=sshd
Failed password for sshd from 130.180.66.98 port 56924 ssh2
Invalid user slaby from 130.180.66.98 port 36214
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98
Failed password for invalid user slaby from 130.180.66.98 port 36214 ssh2
2019-11-30 02:34:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.180.66.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.180.66.97.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040301 1800 900 604800 86400

;; Query time: 132 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 08:48:45 CST 2020
;; MSG SIZE  rcvd: 117
Host info
97.66.180.130.in-addr.arpa domain name pointer b2b-130-180-66-97.unitymedia.biz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.66.180.130.in-addr.arpa	name = b2b-130-180-66-97.unitymedia.biz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.227.231 attackbots
Unauthorized connection attempt detected from IP address 49.235.227.231 to port 2220 [J]
2020-01-23 00:35:22
159.89.145.59 attack
Unauthorized connection attempt detected from IP address 159.89.145.59 to port 2220 [J]
2020-01-23 00:22:29
187.233.221.249 attackbotsspam
Unauthorized connection attempt detected from IP address 187.233.221.249 to port 8000 [J]
2020-01-23 00:17:43
118.24.121.69 attackbotsspam
Unauthorized connection attempt detected from IP address 118.24.121.69 to port 8088 [J]
2020-01-23 00:27:09
149.90.32.127 attackspambots
Unauthorized connection attempt detected from IP address 149.90.32.127 to port 4873 [J]
2020-01-23 00:51:55
42.200.148.195 attackspam
Unauthorized connection attempt detected from IP address 42.200.148.195 to port 4567 [J]
2020-01-23 00:37:22
178.128.92.253 attackbots
$f2bV_matches
2020-01-23 00:47:45
206.189.184.81 attack
"SSH brute force auth login attempt."
2020-01-23 00:43:59
112.72.79.210 attackbots
Unauthorized connection attempt detected from IP address 112.72.79.210 to port 23 [J]
2020-01-23 00:55:20
217.10.102.228 attack
Honeypot attack, port: 5555, PTR: user228.217-10-102.netatonce.net.
2020-01-23 00:43:15
185.95.185.135 attackspambots
Unauthorized connection attempt detected from IP address 185.95.185.135 to port 80 [J]
2020-01-23 00:19:00
175.158.50.225 attackspam
Unauthorized connection attempt detected from IP address 175.158.50.225 to port 8080 [J]
2020-01-23 00:48:35
154.68.39.6 attackspam
Unauthorized connection attempt detected from IP address 154.68.39.6 to port 2220 [J]
2020-01-23 00:23:31
78.189.139.34 attack
Unauthorized connection attempt detected from IP address 78.189.139.34 to port 83 [J]
2020-01-23 00:32:43
38.21.233.33 attack
Unauthorized connection attempt detected from IP address 38.21.233.33 to port 6380 [J]
2020-01-23 00:38:57

Recently Reported IPs

80.211.40.246 221.212.111.67 182.61.48.143 61.74.234.74
58.96.242.120 83.9.195.243 64.225.78.121 51.158.122.211
195.158.26.238 85.185.44.132 58.8.65.107 113.190.28.127
192.144.140.80 217.76.23.94 86.173.93.191 162.117.27.170
175.5.14.15 230.151.152.55 120.103.163.91 191.98.64.144