Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.185.16.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.185.16.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:31:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
141.16.185.130.in-addr.arpa domain name pointer 130-185-16-141.hsi.r-kom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.16.185.130.in-addr.arpa	name = 130-185-16-141.hsi.r-kom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.153.197.103 attack
SmallBizIT.US 2 packets to tcp(3389,3390)
2020-05-22 00:23:24
162.243.145.52 attack
scans once in preceeding hours on the ports (in chronological order) 27018 resulting in total of 54 scans from 162.243.0.0/16 block.
2020-05-22 00:55:02
162.243.136.144 attackspambots
scans 2 times in preceeding hours on the ports (in chronological order) 9200 39057 resulting in total of 54 scans from 162.243.0.0/16 block.
2020-05-22 01:15:55
184.105.247.208 attackspam
srv02 Mass scanning activity detected Target: 8080(http-alt) ..
2020-05-22 00:47:22
92.63.196.23 attackspam
scans 5 times in preceeding hours on the ports (in chronological order) 30006 8005 30002 7007 9004 resulting in total of 5 scans from 92.63.196.0/24 block.
2020-05-22 00:31:57
162.243.136.51 attack
Unauthorized connection attempt detected from IP address 162.243.136.51 to port 23 [T]
2020-05-22 01:16:40
188.227.84.206 spam
Spam Email  claiming to be Microsoft asking for log in credentials.
2020-05-22 00:26:23
167.99.155.36 attack
firewall-block, port(s): 20804/tcp
2020-05-22 00:52:24
167.99.60.170 attackbots
scans once in preceeding hours on the ports (in chronological order) 17222 resulting in total of 5 scans from 167.99.0.0/16 block.
2020-05-22 00:53:50
162.243.135.209 attackbots
404 NOT FOUND
2020-05-22 01:18:34
162.243.144.203 attackspam
" "
2020-05-22 00:56:43
185.176.27.42 attack
05/21/2020-11:41:38.595726 185.176.27.42 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-22 00:43:33
185.153.196.245 attack
slow and persistent scanner
2020-05-22 00:24:27
162.243.139.107 attackbots
scans once in preceeding hours on the ports (in chronological order) 5432 resulting in total of 54 scans from 162.243.0.0/16 block.
2020-05-22 01:09:28
162.243.135.174 attack
404 NOT FOUND
2020-05-22 01:18:55

Recently Reported IPs

25.239.154.107 127.114.122.187 223.95.34.159 55.106.171.100
217.38.103.27 6.133.102.108 53.148.35.24 164.98.156.156
219.151.53.159 206.74.172.56 237.7.170.118 178.109.176.12
114.13.49.11 28.74.29.124 9.130.218.98 156.177.240.22
173.103.161.34 94.33.182.251 134.104.30.57 165.169.16.179