Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bramming

Region: South Denmark

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.228.16.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.228.16.79.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022053000 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 30 22:00:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
79.16.228.130.in-addr.arpa domain name pointer 130228016079.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
79.16.228.130.in-addr.arpa	name = 130228016079.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.100.21.40 attack
Dec  3 19:50:18 server sshd\[31657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Dec  3 19:50:20 server sshd\[31657\]: Failed password for root from 89.100.21.40 port 48614 ssh2
Dec  3 19:58:21 server sshd\[1284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Dec  3 19:58:23 server sshd\[1284\]: Failed password for root from 89.100.21.40 port 51950 ssh2
Dec  3 20:04:57 server sshd\[3107\]: Invalid user xbian from 89.100.21.40
Dec  3 20:04:57 server sshd\[3107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40 
...
2019-12-04 05:54:50
109.160.97.49 attackbots
A spam blank email was sent from this SMTP server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-04 06:02:15
51.77.210.216 attackbots
Dec  3 22:22:48 nextcloud sshd\[9606\]: Invalid user acecxa from 51.77.210.216
Dec  3 22:22:48 nextcloud sshd\[9606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.210.216
Dec  3 22:22:51 nextcloud sshd\[9606\]: Failed password for invalid user acecxa from 51.77.210.216 port 32996 ssh2
...
2019-12-04 06:23:49
35.202.206.232 attack
phpMyAdmin connection attempt
2019-12-04 06:02:01
121.225.70.219 attackspambots
Unauthorised access (Dec  3) SRC=121.225.70.219 LEN=40 TTL=49 ID=24203 TCP DPT=23 WINDOW=5705 SYN 
Unauthorised access (Dec  2) SRC=121.225.70.219 LEN=40 TTL=49 ID=14551 TCP DPT=23 WINDOW=45243 SYN
2019-12-04 05:52:45
91.191.26.22 attackbots
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:47:53
51.75.27.239 attackbotsspam
Dec  4 02:47:03 gw1 sshd[16641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.27.239
Dec  4 02:47:05 gw1 sshd[16641]: Failed password for invalid user dani from 51.75.27.239 port 48866 ssh2
...
2019-12-04 06:01:38
107.170.209.246 attack
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:47:19
181.41.216.136 attackbots
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\<\[181.41.216.131\]\>
Dec  3 22:01:28 relay postfix/smtpd\[9193\]: NOQUEUE: reject: RCPT from unknown\[181.41.216.136\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ pr
...
2019-12-04 06:09:42
103.120.118.106 attackbotsspam
Automatic report - Port Scan Attack
2019-12-04 06:00:27
31.41.93.245 attackbotsspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-12-04 06:21:35
118.27.2.75 attack
SSH invalid-user multiple login attempts
2019-12-04 06:09:11
154.66.219.20 attackspam
SSH auth scanning - multiple failed logins
2019-12-04 06:23:12
103.220.88.184 attack
Automatic report - Port Scan Attack
2019-12-04 05:50:48
187.44.113.33 attackbotsspam
SSH Brute Force
2019-12-04 06:18:39

Recently Reported IPs

205.133.81.255 23.139.165.136 116.245.27.213 223.34.244.211
102.217.173.194 196.252.9.44 53.212.25.187 112.198.65.31
71.196.67.180 90.82.180.96 92.47.159.84 228.227.190.55
101.149.162.41 87.44.254.190 233.207.156.12 5.6.227.96
172.187.84.108 58.47.232.148 135.125.198.211 245.8.153.84