Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.226.142.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.226.142.7.			IN	A

;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:32:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
7.142.226.130.in-addr.arpa domain name pointer asterixssl.itu.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.142.226.130.in-addr.arpa	name = asterixssl.itu.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.85.71.129 attackspambots
SSH Login Bruteforce
2020-05-08 17:26:54
134.175.219.41 attack
ssh brute force
2020-05-08 17:29:50
92.63.194.107 attackbotsspam
5x Failed Password
2020-05-08 17:37:16
71.6.232.7 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-08 17:54:39
51.77.151.147 attackbots
May  8 10:56:27 ns381471 sshd[31674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.151.147
May  8 10:56:29 ns381471 sshd[31674]: Failed password for invalid user ruby from 51.77.151.147 port 35920 ssh2
2020-05-08 17:20:05
167.99.87.82 attack
leo_www
2020-05-08 17:27:28
106.13.6.116 attack
May  8 11:25:19 prox sshd[14824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 
May  8 11:25:20 prox sshd[14824]: Failed password for invalid user rabbitmq from 106.13.6.116 port 38482 ssh2
2020-05-08 17:55:27
107.170.69.191 attackbotsspam
2020-05-07 UTC: (33x) - 18,ab,acm,adam,asecruc,bot,braden,dia,easy,ftptest,giulia,huai,lucas,multi3,oam,qi,rdf,root(10x),ryan,su,ucpss,uw,vivek,wmdemo
2020-05-08 17:51:03
85.25.91.142 attackspambots
May  8 10:31:00 ns3164893 sshd[23165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.25.91.142
May  8 10:31:02 ns3164893 sshd[23165]: Failed password for invalid user dev from 85.25.91.142 port 53001 ssh2
...
2020-05-08 17:36:41
144.34.170.117 attackbots
May  8 06:47:28 ns3033917 sshd[8305]: Failed password for invalid user usuario2 from 144.34.170.117 port 42392 ssh2
May  8 07:00:29 ns3033917 sshd[8382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.170.117  user=root
May  8 07:00:30 ns3033917 sshd[8382]: Failed password for root from 144.34.170.117 port 33148 ssh2
...
2020-05-08 17:27:51
49.150.106.136 attackbots
Sniffing for wp-login
2020-05-08 17:39:28
182.74.25.246 attackbotsspam
$f2bV_matches
2020-05-08 17:55:56
37.54.48.108 attackbots
Unauthorized connection attempt detected from IP address 37.54.48.108 to port 23
2020-05-08 17:58:29
161.35.27.253 attackbots
IDS bruteforce
2020-05-08 17:39:03
36.231.165.249 attack
Port probing on unauthorized port 23
2020-05-08 17:20:35

Recently Reported IPs

130.226.47.28 130.232.212.56 130.232.212.91 130.234.6.152
130.236.18.52 130.234.6.46 130.231.240.1 130.236.254.233
130.232.246.90 130.237.79.41 130.238.7.133 130.235.52.5
130.233.248.76 130.238.7.134 130.238.7.114 130.238.7.135
130.235.97.220 130.238.96.89 130.242.124.102 130.250.172.232