Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Turku

Region: Finland Proper

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: Tieteen tietotekniikan keskus Oy

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.232.49.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61563
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.232.49.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 04:55:41 CST 2019
;; MSG SIZE  rcvd: 118

Host info
138.49.232.130.in-addr.arpa domain name pointer dyn49-138.bra.net.utu.fi.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
138.49.232.130.in-addr.arpa	name = dyn49-138.bra.net.utu.fi.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
66.131.216.79 attackspam
$f2bV_matches
2020-03-26 14:48:16
1.53.144.209 attackbots
1585194714 - 03/26/2020 04:51:54 Host: 1.53.144.209/1.53.144.209 Port: 445 TCP Blocked
2020-03-26 15:17:19
142.93.137.144 attack
Mar 26 06:44:37 pi sshd[10015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.137.144 
Mar 26 06:44:39 pi sshd[10015]: Failed password for invalid user kathie from 142.93.137.144 port 36198 ssh2
2020-03-26 14:47:03
174.221.135.192 attack
Brute forcing email accounts
2020-03-26 14:56:29
212.115.53.7 attackspam
DATE:2020-03-26 07:53:29, IP:212.115.53.7, PORT:ssh SSH brute force auth (docker-dc)
2020-03-26 15:16:26
111.229.53.186 attackbots
sshd jail - ssh hack attempt
2020-03-26 15:11:55
49.254.42.156 attack
Mar 26 08:32:10 pkdns2 sshd\[44252\]: Invalid user sh from 49.254.42.156Mar 26 08:32:13 pkdns2 sshd\[44252\]: Failed password for invalid user sh from 49.254.42.156 port 28564 ssh2Mar 26 08:37:01 pkdns2 sshd\[44441\]: Invalid user mu from 49.254.42.156Mar 26 08:37:03 pkdns2 sshd\[44441\]: Failed password for invalid user mu from 49.254.42.156 port 32558 ssh2Mar 26 08:41:55 pkdns2 sshd\[44658\]: Invalid user aufbauorganisation from 49.254.42.156Mar 26 08:41:57 pkdns2 sshd\[44658\]: Failed password for invalid user aufbauorganisation from 49.254.42.156 port 26596 ssh2
...
2020-03-26 14:43:02
122.51.136.128 attackspam
k+ssh-bruteforce
2020-03-26 14:49:46
103.126.172.6 attack
Invalid user admin from 103.126.172.6 port 54134
2020-03-26 14:48:33
45.63.83.160 attack
Mar 26 06:06:36 vps691689 sshd[7304]: Failed password for root from 45.63.83.160 port 42404 ssh2
Mar 26 06:08:20 vps691689 sshd[7308]: Failed password for root from 45.63.83.160 port 49420 ssh2
...
2020-03-26 14:53:14
49.234.30.113 attackbots
Mar 26 00:27:07 ny01 sshd[24118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.113
Mar 26 00:27:09 ny01 sshd[24118]: Failed password for invalid user takagi from 49.234.30.113 port 49178 ssh2
Mar 26 00:30:41 ny01 sshd[25654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.30.113
2020-03-26 15:20:22
64.227.21.201 attackbotsspam
Mar 26 07:24:19 server sshd[28950]: Failed password for invalid user fuji from 64.227.21.201 port 34364 ssh2
Mar 26 08:20:05 server sshd[44262]: Failed password for invalid user ex from 64.227.21.201 port 43910 ssh2
Mar 26 08:25:25 server sshd[45681]: Failed password for invalid user piccatravel from 64.227.21.201 port 58732 ssh2
2020-03-26 15:27:53
140.143.140.242 attackbots
Mar 26 05:49:09 lukav-desktop sshd\[32714\]: Invalid user qucheng from 140.143.140.242
Mar 26 05:49:09 lukav-desktop sshd\[32714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.140.242
Mar 26 05:49:11 lukav-desktop sshd\[32714\]: Failed password for invalid user qucheng from 140.143.140.242 port 40040 ssh2
Mar 26 05:51:49 lukav-desktop sshd\[308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.140.242  user=mail
Mar 26 05:51:51 lukav-desktop sshd\[308\]: Failed password for mail from 140.143.140.242 port 44868 ssh2
2020-03-26 15:18:35
117.6.213.40 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-26 14:51:59
184.82.197.171 attackspam
ssh brute force
2020-03-26 15:12:22

Recently Reported IPs

74.188.245.67 27.101.28.185 215.29.112.169 182.237.146.127
163.142.117.39 72.24.97.213 130.180.184.230 23.42.11.54
88.38.47.122 18.208.38.199 5.94.148.239 58.5.34.48
133.209.3.20 5.115.104.124 2.170.208.174 170.55.2.94
79.251.148.107 84.209.137.76 5.152.146.242 86.142.113.4