Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.241.203.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.241.203.180.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:16:14 CST 2025
;; MSG SIZE  rcvd: 108
Host info
180.203.241.130.in-addr.arpa domain name pointer dhcp203180.fysiologi.gu.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.203.241.130.in-addr.arpa	name = dhcp203180.fysiologi.gu.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.46.62.150 attack
Brute force attack stopped by firewall
2019-07-01 08:52:34
167.99.228.223 attack
Jul  1 00:52:37 server sshd[20914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.228.223
...
2019-07-01 08:54:32
183.134.65.22 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-07-01 08:53:39
182.190.4.84 attackspam
Brute force attack stopped by firewall
2019-07-01 08:54:04
51.15.191.38 attack
Brute force attack stopped by firewall
2019-07-01 09:03:03
191.53.248.187 attackbots
Brute force attack stopped by firewall
2019-07-01 08:48:09
191.53.250.143 attackbotsspam
Brute force attack stopped by firewall
2019-07-01 08:49:32
143.208.248.98 attack
Brute force attack stopped by firewall
2019-07-01 09:10:04
115.238.194.205 attackspam
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 09:05:32
54.208.197.6 attackspambots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2019-07-01 09:12:53
61.148.196.114 attack
Brute force attack stopped by firewall
2019-07-01 08:56:39
191.53.222.195 attackspambots
Brute force attack stopped by firewall
2019-07-01 08:48:38
168.196.15.193 attackbotsspam
Sending SPAM email
2019-07-01 09:12:06
46.165.10.136 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-30 21:52:11,450 INFO [amun_request_handler] PortScan Detected on Port: 445 (46.165.10.136)
2019-07-01 08:42:16
190.252.253.108 attack
ssh failed login
2019-07-01 08:51:12

Recently Reported IPs

127.53.3.43 59.42.47.144 214.187.209.205 215.13.211.208
127.84.206.164 245.36.229.140 193.183.86.154 8.227.74.194
126.97.17.135 172.205.178.45 181.134.170.158 118.75.68.161
205.227.220.22 140.32.150.95 138.153.132.186 179.202.150.67
161.225.87.199 42.8.206.134 218.226.225.161 221.207.238.239