Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.197.221.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.197.221.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:00:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 51.221.197.130.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 130.197.221.51.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
5.135.129.180 attackspam
LGS,WP GET /wp-login.php
GET /wp-login.php
GET /wp-login.php
2020-01-15 19:14:35
203.160.176.35 attackbots
1579077307 - 01/15/2020 09:35:07 Host: 203.160.176.35/203.160.176.35 Port: 445 TCP Blocked
2020-01-15 19:18:10
196.204.197.67 attackspambots
Unauthorized connection attempt from IP address 196.204.197.67 on Port 445(SMB)
2020-01-15 19:15:08
86.57.207.126 attackspambots
Unauthorized connection attempt from IP address 86.57.207.126 on Port 445(SMB)
2020-01-15 19:33:51
171.234.145.157 attackspam
Unauthorized connection attempt from IP address 171.234.145.157 on Port 445(SMB)
2020-01-15 19:16:49
223.206.232.87 attack
Unauthorized connection attempt from IP address 223.206.232.87 on Port 445(SMB)
2020-01-15 18:59:57
118.122.124.78 attack
$f2bV_matches
2020-01-15 19:04:36
14.255.73.133 attack
Unauthorized connection attempt from IP address 14.255.73.133 on Port 445(SMB)
2020-01-15 19:26:22
178.32.47.97 attack
Jan 15 12:48:41 lukav-desktop sshd\[20309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97  user=root
Jan 15 12:48:43 lukav-desktop sshd\[20309\]: Failed password for root from 178.32.47.97 port 43492 ssh2
Jan 15 12:53:07 lukav-desktop sshd\[12164\]: Invalid user git from 178.32.47.97
Jan 15 12:53:07 lukav-desktop sshd\[12164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97
Jan 15 12:53:08 lukav-desktop sshd\[12164\]: Failed password for invalid user git from 178.32.47.97 port 35364 ssh2
2020-01-15 19:19:27
34.227.95.33 attack
Unauthorized connection attempt detected from IP address 34.227.95.33 to port 443 [J]
2020-01-15 19:38:25
8.4.32.4 attackbotsspam
Unauthorized connection attempt from IP address 8.4.32.4 on Port 445(SMB)
2020-01-15 19:40:10
137.59.227.216 attackbotsspam
Unauthorized connection attempt from IP address 137.59.227.216 on Port 445(SMB)
2020-01-15 19:29:28
112.196.54.35 attackbots
Unauthorized connection attempt detected from IP address 112.196.54.35 to port 2220 [J]
2020-01-15 19:02:35
14.243.188.236 attackspambots
Unauthorized connection attempt from IP address 14.243.188.236 on Port 445(SMB)
2020-01-15 19:26:51
67.100.99.250 attackbotsspam
Brute force SSH attack
2020-01-15 19:22:50

Recently Reported IPs

78.120.133.195 50.203.149.137 164.127.126.100 155.64.118.60
66.2.156.78 37.148.220.201 99.210.91.221 226.38.173.19
30.178.151.12 26.116.156.244 219.171.183.39 144.252.96.109
74.230.194.254 7.128.155.58 146.53.180.208 127.155.205.102
98.15.93.85 135.68.254.150 62.155.60.182 19.17.241.35