Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.228.89.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.228.89.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:26:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
212.89.228.130.in-addr.arpa domain name pointer 130228089212.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.89.228.130.in-addr.arpa	name = 130228089212.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.75.210.58 attackspam
Unauthorized connection attempt detected from IP address 111.75.210.58 to port 445 [T]
2020-05-20 06:31:15
103.243.40.22 attackspam
 TCP (SYN) 103.243.40.22:62872 -> port 23, len 40
2020-05-20 06:36:13
113.161.211.205 attackspam
 TCP (SYN) 113.161.211.205:35331 -> port 22, len 52
2020-05-20 06:00:41
222.153.94.201 attack
 TCP (SYN) 222.153.94.201:35588 -> port 23, len 40
2020-05-20 06:27:50
85.105.102.69 attack
 TCP (SYN) 85.105.102.69:55639 -> port 37215, len 44
2020-05-20 06:10:06
94.225.223.187 attack
Unauthorized connection attempt detected from IP address 94.225.223.187 to port 23
2020-05-20 06:15:39
124.77.186.8 attackspambots
[portscan] tcp/1433 [MsSQL]
[scan/connect: 2 time(s)]
*(RWIN=8192)(05191225)
2020-05-20 06:21:30
162.243.137.172 attackbots
firewall-block, port(s): 137/udp
2020-05-20 06:30:33
223.189.190.76 attack
 TCP (SYN) 223.189.190.76:64413 -> port 445, len 52
2020-05-20 06:37:33
111.68.107.130 attack
 TCP (SYN) 111.68.107.130:56667 -> port 445, len 52
2020-05-20 06:31:30
118.170.200.74 attackspambots
port 23
2020-05-20 06:03:35
118.35.65.61 attackbotsspam
 TCP (SYN) 118.35.65.61:48655 -> port 23, len 40
2020-05-20 06:16:51
217.165.147.193 attack
 TCP (SYN) 217.165.147.193:59110 -> port 445, len 52
2020-05-20 06:29:27
111.26.163.180 attackspam
 TCP (SYN) 111.26.163.180:52774 -> port 1433, len 44
2020-05-20 06:31:53
91.207.175.154 attackbots
 TCP (SYN) 91.207.175.154:57239 -> port 53, len 40
2020-05-20 06:32:05

Recently Reported IPs

29.95.184.202 197.49.174.75 174.2.106.231 203.59.7.120
67.211.196.179 206.27.53.236 100.51.217.55 69.81.119.255
231.149.175.82 166.185.255.209 167.36.145.109 229.72.157.54
184.222.31.113 176.182.61.246 48.196.8.230 241.154.255.130
231.42.107.126 96.249.35.226 104.43.155.191 195.54.146.140