Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Auckland

Region: Auckland

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: The University of Auckland

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.216.225.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6413
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.216.225.108.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072602 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 27 06:32:55 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 108.225.216.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 108.225.216.130.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
46.101.88.10 attackspambots
Jan 13 11:40:42 vps46666688 sshd[32181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.88.10
Jan 13 11:40:44 vps46666688 sshd[32181]: Failed password for invalid user postgres from 46.101.88.10 port 26816 ssh2
...
2020-01-14 00:12:23
118.70.123.167 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-01-14 00:10:30
217.219.217.81 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:17:06
171.7.226.113 attack
20/1/13@08:06:39: FAIL: IoT-SSH address from=171.7.226.113
...
2020-01-14 00:38:16
194.219.8.13 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 00:09:56
193.56.28.151 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 00:16:17
213.32.23.58 attack
Unauthorized connection attempt detected from IP address 213.32.23.58 to port 2220 [J]
2020-01-13 23:58:20
181.16.19.191 attack
Honeypot attack, port: 445, PTR: host-181-16-19-191.telered.com.ar.
2020-01-14 00:12:56
188.151.54.174 attackbotsspam
Honeypot attack, port: 5555, PTR: c188-151-54-174.bredband.comhem.se.
2020-01-14 00:11:18
14.39.183.227 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-14 00:05:00
114.84.174.146 attackspam
Invalid user sou from 114.84.174.146 port 45530
2020-01-14 00:20:09
37.119.230.22 attackspambots
Invalid user fx from 37.119.230.22 port 37812
2020-01-14 00:25:54
58.218.213.141 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-14 00:16:00
80.19.73.82 attackbotsspam
Linear eMerge E3 Unauthenticated Command Injection Remote Root Exploit Vulnerability
2020-01-14 00:22:35
177.98.22.111 attackbotsspam
Unauthorized connection attempt detected from IP address 177.98.22.111 to port 81 [J]
2020-01-14 00:26:46

Recently Reported IPs

176.169.47.172 142.93.224.235 118.126.103.216 74.155.56.145
26.146.84.53 101.215.62.153 172.81.243.232 93.158.227.87
72.85.60.28 173.8.249.26 123.20.132.232 56.59.210.219
173.216.198.183 159.185.255.40 8.155.212.227 200.168.176.165
41.36.186.182 54.254.169.97 95.216.3.178 59.23.132.252