Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       130.247.0.0 - 130.247.255.255
CIDR:           130.247.0.0/16
NetName:        BOE-TRANS
NetHandle:      NET-130-247-0-0-1
Parent:         NET130 (NET-130-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   The Boeing Company (THEBOE)
RegDate:        1988-10-25
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/130.247.0.0


OrgName:        The Boeing Company
OrgId:          THEBOE
Address:        The Boeing Company
Address:        100 N. Riverside
City:           Chicago
StateProv:      IL
PostalCode:     60606-1596
Country:        US
RegDate:        1988-06-13
Updated:        2022-03-18
Ref:            https://rdap.arin.net/registry/entity/THEBOE


OrgTechHandle: NEO-ARIN
OrgTechName:   Network Engineering and Operations
OrgTechPhone:  +1-425-373-2570 
OrgTechEmail:  Network.Registrar@boeing.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NEO-ARIN

OrgAbuseHandle: AIR4-ARIN
OrgAbuseName:   Abuse and Incident Response
OrgAbusePhone:  +1-888-373-7501 
OrgAbuseEmail:  abuse@boeing.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AIR4-ARIN

OrgNOCHandle: NEO-ARIN
OrgNOCName:   Network Engineering and Operations
OrgNOCPhone:  +1-425-373-2570 
OrgNOCEmail:  Network.Registrar@boeing.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NEO-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.247.248.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.247.248.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 09:00:18 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 85.248.247.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.248.247.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.90.169.134 attackspam
Unauthorized connection attempt from IP address 212.90.169.134 on Port 445(SMB)
2019-08-17 10:45:35
122.160.13.206 attackspam
:
2019-08-17 11:09:27
117.221.70.6 attackbotsspam
Aug 16 21:08:26 XXX sshd[25216]: Invalid user messagebus from 117.221.70.6 port 53290
2019-08-17 11:27:41
222.186.15.101 attackbots
Aug 17 05:11:51 fr01 sshd[22318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
Aug 17 05:11:53 fr01 sshd[22318]: Failed password for root from 222.186.15.101 port 27090 ssh2
...
2019-08-17 11:12:14
92.118.37.86 attackbots
08/16/2019-21:19:15.548036 92.118.37.86 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-17 11:25:24
122.2.112.101 attackbots
2019-08-17T03:15:04.251640abusebot-5.cloudsearch.cf sshd\[19267\]: Invalid user Access from 122.2.112.101 port 52630
2019-08-17 11:27:02
200.233.138.102 attackspam
Unauthorized connection attempt from IP address 200.233.138.102 on Port 445(SMB)
2019-08-17 11:28:53
142.93.140.192 attack
[munged]::443 142.93.140.192 - - [17/Aug/2019:04:53:39 +0200] "POST /[munged]: HTTP/1.1" 200 6177 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:61.0.1) Gecko/20120101 Firefox/61.0.1"
[munged]::443 142.93.140.192 - - [17/Aug/2019:04:53:41 +0200] "POST /[munged]: HTTP/1.1" 200 6183 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:61.0.1) Gecko/20120101 Firefox/61.0.1"
2019-08-17 11:17:02
194.93.59.13 attackbotsspam
WordPress brute force
2019-08-17 10:53:57
51.38.57.78 attackspambots
Automatic report - Banned IP Access
2019-08-17 11:01:33
125.92.223.150 attackspam
Aug 17 04:53:02 datentool sshd[24064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.92.223.150  user=r.r
Aug 17 04:53:05 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:07 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:09 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:10 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:12 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:15 datentool sshd[24064]: Failed password for r.r from 125.92.223.150 port 56318 ssh2
Aug 17 04:53:15 datentool sshd[24064]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.92.223.150  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.92.223.150
2019-08-17 11:07:07
1.209.171.64 attackspambots
Aug 16 23:05:25 spiceship sshd\[941\]: Invalid user test from 1.209.171.64
Aug 16 23:05:25 spiceship sshd\[941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64
...
2019-08-17 11:06:12
198.100.149.77 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-08-17 10:53:32
167.86.96.137 attackspambots
WordPress wp-login brute force :: 167.86.96.137 0.188 BYPASS [17/Aug/2019:12:54:04  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-17 11:08:41
36.224.212.246 attackbotsspam
:
2019-08-17 10:53:13

Recently Reported IPs

64.72.118.62 12.250.214.123 110.78.156.183 2606:4700:10::6814:7403
2606:4700:10::6814:7893 2606:4700:10::6816:3850 2606:4700:10::6816:4132 2606:4700:10::ac43:2003
2606:4700:10::ac43:2543 2606:4700:10::6816:3397 2606:4700:10::6816:4615 2606:4700:10::6814:6954
170.245.1.89 180.93.243.46 134.209.241.145 220.67.113.196
208.92.3.91 183.106.115.61 179.108.30.45 141.244.12.161