Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clayton

Region: Victoria

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: Monash University

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.194.102.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15922
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.194.102.5.			IN	A

;; AUTHORITY SECTION:
.			2383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 02 00:56:35 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 5.102.194.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 5.102.194.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.148.213.154 attackspambots
9001/tcp
[2019-10-18]1pkt
2019-10-19 06:03:45
62.234.73.249 attack
Invalid user yn from 62.234.73.249 port 39122
2019-10-19 06:10:38
89.211.165.97 attackbotsspam
Automatic report - Port Scan Attack
2019-10-19 06:11:07
185.176.27.14 attack
10/18/2019-16:59:46.652559 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-19 06:01:47
198.50.200.80 attack
Invalid user web1 from 198.50.200.80 port 34468
2019-10-19 05:54:57
114.6.196.46 attackspambots
Brute force attempt
2019-10-19 06:22:14
217.219.23.162 attackbots
firewall-block, port(s): 445/tcp
2019-10-19 05:50:16
67.231.240.195 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-10-19 05:51:16
92.207.180.50 attackbots
Oct 18 21:49:04 game-panel sshd[23973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50
Oct 18 21:49:06 game-panel sshd[23973]: Failed password for invalid user test from 92.207.180.50 port 45243 ssh2
Oct 18 21:52:31 game-panel sshd[24073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50
2019-10-19 06:04:55
24.2.205.235 attackspam
Oct 18 23:04:59 jane sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.2.205.235 
Oct 18 23:05:01 jane sshd[8679]: Failed password for invalid user ubnt from 24.2.205.235 port 46659 ssh2
...
2019-10-19 05:48:44
180.76.142.91 attackbotsspam
Oct 18 18:03:09 xtremcommunity sshd\[657691\]: Invalid user user from 180.76.142.91 port 38374
Oct 18 18:03:09 xtremcommunity sshd\[657691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.91
Oct 18 18:03:11 xtremcommunity sshd\[657691\]: Failed password for invalid user user from 180.76.142.91 port 38374 ssh2
Oct 18 18:07:30 xtremcommunity sshd\[657796\]: Invalid user user from 180.76.142.91 port 48052
Oct 18 18:07:30 xtremcommunity sshd\[657796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.142.91
...
2019-10-19 06:19:58
59.92.97.17 attack
firewall-block, port(s): 23/tcp
2019-10-19 06:28:25
110.80.17.26 attackspam
Invalid user abcd from 110.80.17.26 port 43430
2019-10-19 06:27:01
192.42.116.23 attackbotsspam
2019-10-18T21:55:42.525663abusebot.cloudsearch.cf sshd\[29843\]: Invalid user sysadm from 192.42.116.23 port 41284
2019-10-19 06:14:45
185.209.0.92 attackspam
10/18/2019-22:45:40.879623 185.209.0.92 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-19 05:51:41

Recently Reported IPs

24.85.192.240 203.159.80.212 119.83.212.108 55.94.148.73
106.4.246.181 187.171.18.172 63.235.3.119 68.169.216.209
87.246.3.48 105.15.42.25 110.180.87.27 90.129.54.115
95.161.29.76 88.91.160.135 120.34.229.14 171.237.170.230
173.80.153.45 136.1.142.172 50.2.132.123 154.33.45.5