Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.246.106.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.246.106.114.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 07:35:54 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 114.106.246.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.106.246.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.207.13.200 attack
Sep 30 05:31:22 iago sshd[11067]: Invalid user admin from 175.207.13.200
Sep 30 05:31:22 iago sshd[11067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=175.207.13.200
2019-10-01 14:30:52
80.229.37.119 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/80.229.37.119/ 
 GB - 1H : (125)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN6871 
 
 IP : 80.229.37.119 
 
 CIDR : 80.229.0.0/16 
 
 PREFIX COUNT : 71 
 
 UNIQUE IP COUNT : 1876224 
 
 
 WYKRYTE ATAKI Z ASN6871 :  
  1H - 2 
  3H - 3 
  6H - 3 
 12H - 4 
 24H - 4 
 
 DateTime : 2019-10-01 05:53:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 13:55:07
213.183.101.89 attackbots
Sep 30 19:51:50 web9 sshd\[8800\]: Invalid user gmodserv from 213.183.101.89
Sep 30 19:51:50 web9 sshd\[8800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89
Sep 30 19:51:52 web9 sshd\[8800\]: Failed password for invalid user gmodserv from 213.183.101.89 port 44020 ssh2
Sep 30 19:56:20 web9 sshd\[9790\]: Invalid user 09 from 213.183.101.89
Sep 30 19:56:20 web9 sshd\[9790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.183.101.89
2019-10-01 14:05:29
222.186.175.154 attackbots
2019-10-01T05:49:09.758956shield sshd\[27534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
2019-10-01T05:49:11.870479shield sshd\[27534\]: Failed password for root from 222.186.175.154 port 52572 ssh2
2019-10-01T05:49:16.266794shield sshd\[27534\]: Failed password for root from 222.186.175.154 port 52572 ssh2
2019-10-01T05:49:20.211717shield sshd\[27534\]: Failed password for root from 222.186.175.154 port 52572 ssh2
2019-10-01T05:49:25.039788shield sshd\[27534\]: Failed password for root from 222.186.175.154 port 52572 ssh2
2019-10-01 13:51:48
220.132.221.85 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/220.132.221.85/ 
 TW - 1H : (226)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 220.132.221.85 
 
 CIDR : 220.132.192.0/18 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 23 
  3H - 53 
  6H - 66 
 12H - 96 
 24H - 158 
 
 DateTime : 2019-10-01 05:53:01 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 13:56:21
58.210.46.54 attackspam
Oct  1 01:46:48 plusreed sshd[10941]: Invalid user get from 58.210.46.54
...
2019-10-01 14:06:36
51.38.128.94 attackbotsspam
Brute SSH
2019-10-01 14:07:13
36.92.95.10 attack
Sep 30 20:03:22 hanapaa sshd\[11462\]: Invalid user zr from 36.92.95.10
Sep 30 20:03:22 hanapaa sshd\[11462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
Sep 30 20:03:24 hanapaa sshd\[11462\]: Failed password for invalid user zr from 36.92.95.10 port 49332 ssh2
Sep 30 20:10:38 hanapaa sshd\[12118\]: Invalid user hadoop from 36.92.95.10
Sep 30 20:10:38 hanapaa sshd\[12118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
2019-10-01 14:25:26
41.144.71.7 attackbotsspam
$f2bV_matches
2019-10-01 13:58:29
221.132.17.81 attackbotsspam
Invalid user rodney from 221.132.17.81 port 43462
2019-10-01 14:23:26
43.226.69.130 attackbots
Oct  1 03:58:58 vtv3 sshd\[31785\]: Invalid user tehnolog from 43.226.69.130 port 55076
Oct  1 03:58:58 vtv3 sshd\[31785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 03:59:00 vtv3 sshd\[31785\]: Failed password for invalid user tehnolog from 43.226.69.130 port 55076 ssh2
Oct  1 04:02:53 vtv3 sshd\[1411\]: Invalid user test2 from 43.226.69.130 port 60132
Oct  1 04:02:53 vtv3 sshd\[1411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 04:14:49 vtv3 sshd\[7284\]: Invalid user yx from 43.226.69.130 port 47052
Oct  1 04:14:49 vtv3 sshd\[7284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.130
Oct  1 04:14:51 vtv3 sshd\[7284\]: Failed password for invalid user yx from 43.226.69.130 port 47052 ssh2
Oct  1 04:18:52 vtv3 sshd\[9358\]: Invalid user alin from 43.226.69.130 port 52104
Oct  1 04:18:52 vtv3 sshd\[9358\]: pam_unix\(ssh
2019-10-01 14:07:43
192.42.116.28 attack
Oct  1 07:06:24 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct  1 07:06:26 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct  1 07:06:28 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct  1 07:06:31 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct  1 07:06:35 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2Oct  1 07:06:37 rotator sshd\[3708\]: Failed password for root from 192.42.116.28 port 45676 ssh2
...
2019-10-01 14:28:57
164.132.98.75 attackbots
Oct  1 09:15:22 gw1 sshd[32064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
Oct  1 09:15:25 gw1 sshd[32064]: Failed password for invalid user 123 from 164.132.98.75 port 60078 ssh2
...
2019-10-01 14:14:39
106.12.83.210 attackbots
Oct  1 07:31:57 vps01 sshd[641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.210
Oct  1 07:31:58 vps01 sshd[641]: Failed password for invalid user projetecno from 106.12.83.210 port 45088 ssh2
2019-10-01 13:54:42
222.186.175.202 attack
Oct  1 07:58:53 arianus sshd\[31881\]: Unable to negotiate with 222.186.175.202 port 31590: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
...
2019-10-01 14:04:56

Recently Reported IPs

131.25.60.55 95.15.186.141 132.160.201.94 127.189.3.80
59.166.188.51 241.111.147.36 13.33.169.78 98.25.143.233
218.243.44.165 155.190.100.78 50.55.151.21 47.14.18.73
172.19.173.191 158.120.135.186 129.227.167.214 31.94.140.11
226.152.172.145 120.220.147.40 141.230.222.209 64.66.51.39