Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.242.58.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.242.58.227.			IN	A

;; AUTHORITY SECTION:
.			128	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:13:52 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 227.58.242.130.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
b'227.58.242.130.in-addr.arpa	name = fhs.se.
227.58.242.130.in-addr.arpa	name = sedu.se.
227.58.242.130.in-addr.arpa	name = www.fhs.se.
227.58.242.130.in-addr.arpa	name = www.swedishdefenceuniversity.se.
227.58.242.130.in-addr.arpa	name = swedishdefenceuniversity.se.
227.58.242.130.in-addr.arpa	name = forsvarshogskolan.se.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
171.220.242.90 attack
Jul 23 10:30:39 buvik sshd[17271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.242.90
Jul 23 10:30:41 buvik sshd[17271]: Failed password for invalid user user from 171.220.242.90 port 57034 ssh2
Jul 23 10:34:44 buvik sshd[17822]: Invalid user brendan from 171.220.242.90
...
2020-07-23 19:32:25
43.250.187.130 attackspambots
firewall-block, port(s): 1433/tcp
2020-07-23 19:44:26
144.64.128.43 attack
Invalid user superman from 144.64.128.43 port 35466
2020-07-23 20:05:48
103.145.12.170 attack
[2020-07-23 07:13:30] NOTICE[1277] chan_sip.c: Registration from '' failed for '103.145.12.170:62689' - Wrong password
[2020-07-23 07:13:30] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-23T07:13:30.167-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="722",SessionID="0x7f17545b1d48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.170/62689",Challenge="5c9969c5",ReceivedChallenge="5c9969c5",ReceivedHash="1b11190150999e2443037f782d04e2d2"
[2020-07-23 07:16:43] NOTICE[1277] chan_sip.c: Registration from '' failed for '103.145.12.170:56764' - Wrong password
[2020-07-23 07:16:43] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-23T07:16:43.816-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="733",SessionID="0x7f175452b198",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.170
...
2020-07-23 19:29:04
106.12.24.193 attack
Invalid user nagios from 106.12.24.193 port 33428
2020-07-23 19:34:29
106.12.74.99 attackbots
$f2bV_matches
2020-07-23 19:51:04
185.176.27.198 attackbotsspam
Jul 23 13:18:48 debian-2gb-nbg1-2 kernel: \[17761653.943662\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.198 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=39270 PROTO=TCP SPT=57011 DPT=12007 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-23 19:34:47
213.217.1.34 attackspambots
Jul 23 12:41:20 debian-2gb-nbg1-2 kernel: \[17759405.502350\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.1.34 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63275 PROTO=TCP SPT=57028 DPT=6282 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-23 19:30:54
104.248.66.115 attackbotsspam
Jul 23 13:33:33 vps sshd[796325]: Failed password for invalid user nabil from 104.248.66.115 port 49638 ssh2
Jul 23 13:37:26 vps sshd[815718]: Invalid user oracle from 104.248.66.115 port 35716
Jul 23 13:37:26 vps sshd[815718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.66.115
Jul 23 13:37:28 vps sshd[815718]: Failed password for invalid user oracle from 104.248.66.115 port 35716 ssh2
Jul 23 13:41:32 vps sshd[834905]: Invalid user popeye from 104.248.66.115 port 50032
...
2020-07-23 19:48:52
111.206.250.235 attackspambots
webserver:80 [23/Jul/2020]  "\x16\x03\x01\x02" 400 0
2020-07-23 19:40:08
182.61.138.203 attack
SSH Brute-Forcing (server1)
2020-07-23 19:30:26
24.102.241.165 attackspambots
Icarus honeypot on github
2020-07-23 19:46:30
93.107.187.162 attackbots
Invalid user maxx from 93.107.187.162 port 49826
2020-07-23 19:29:37
106.12.59.23 attack
Invalid user ella from 106.12.59.23 port 43576
2020-07-23 19:44:06
186.226.37.125 attack
ssh intrusion attempt
2020-07-23 19:29:57

Recently Reported IPs

130.250.2.112 130.255.78.146 130.43.112.229 130.61.16.246
130.255.81.9 130.61.92.165 130.43.24.235 130.43.93.227
130.91.210.143 130.63.63.180 130.86.9.189 131.0.196.28
131.0.196.235 131.0.197.36 131.0.199.23 131.0.199.81
131.0.199.73 131.1.220.94 131.1.241.62 131.1.254.30