Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.249.197.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.249.197.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 17:05:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 41.197.249.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.197.249.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.209.248.134 attackspam
ping sweep
2020-05-08 20:07:38
125.25.89.80 attack
20/5/7@23:48:54: FAIL: Alarm-Network address from=125.25.89.80
...
2020-05-08 19:39:57
178.218.70.131 attackspambots
Fail2Ban Ban Triggered
2020-05-08 20:11:40
91.67.141.130 attackspam
May  8 13:29:49 debian-2gb-nbg1-2 kernel: \[11196270.911004\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=91.67.141.130 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=243 ID=9513 DF PROTO=TCP SPT=12028 DPT=8153 WINDOW=512 RES=0x00 SYN URGP=0
2020-05-08 19:42:19
180.246.90.9 attack
Brute forcing RDP port 3389
2020-05-08 19:56:54
79.72.70.205 attackspambots
79.72.70.205 - - [08/May/2020:05:48:58 +0200] "GET / HTTP/1.1" 400 0 "-" "-"
2020-05-08 19:36:46
222.186.31.204 attackbots
May  8 13:17:40 minden010 sshd[31290]: Failed password for root from 222.186.31.204 port 49912 ssh2
May  8 13:17:42 minden010 sshd[31290]: Failed password for root from 222.186.31.204 port 49912 ssh2
May  8 13:17:44 minden010 sshd[31290]: Failed password for root from 222.186.31.204 port 49912 ssh2
...
2020-05-08 19:33:45
80.211.13.167 attackspambots
Tried sshing with brute force.
2020-05-08 19:56:21
51.255.132.213 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-05-08 19:34:16
194.170.156.9 attackbots
May  8 13:35:59 nextcloud sshd\[3695\]: Invalid user jenkins from 194.170.156.9
May  8 13:35:59 nextcloud sshd\[3695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9
May  8 13:36:01 nextcloud sshd\[3695\]: Failed password for invalid user jenkins from 194.170.156.9 port 38691 ssh2
2020-05-08 19:58:41
45.116.35.144 attack
2020-05-08T04:55:59.622012server.espacesoutien.com sshd[18246]: Failed password for root from 45.116.35.144 port 39162 ssh2
2020-05-08T04:57:09.670553server.espacesoutien.com sshd[18367]: Invalid user import from 45.116.35.144 port 54654
2020-05-08T04:57:09.685362server.espacesoutien.com sshd[18367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.116.35.144
2020-05-08T04:57:09.670553server.espacesoutien.com sshd[18367]: Invalid user import from 45.116.35.144 port 54654
2020-05-08T04:57:11.484798server.espacesoutien.com sshd[18367]: Failed password for invalid user import from 45.116.35.144 port 54654 ssh2
...
2020-05-08 19:52:24
94.102.51.16 attack
scans 12 times in preceeding hours on the ports (in chronological order) 62130 62118 62124 62101 62057 62004 62021 62015 62061 62116 62096 62044 resulting in total of 52 scans from 94.102.48.0/20 block.
2020-05-08 19:38:54
185.94.111.1 attackbots
scans 2 times in preceeding hours on the ports (in chronological order) 13331 1900
2020-05-08 19:38:11
159.89.88.119 attackbotsspam
2020-05-08T07:08:18.8825811495-001 sshd[21843]: Failed password for invalid user manager from 159.89.88.119 port 48422 ssh2
2020-05-08T07:10:05.5436191495-001 sshd[21896]: Invalid user apolo from 159.89.88.119 port 53296
2020-05-08T07:10:05.5514691495-001 sshd[21896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.88.119
2020-05-08T07:10:05.5436191495-001 sshd[21896]: Invalid user apolo from 159.89.88.119 port 53296
2020-05-08T07:10:07.5194441495-001 sshd[21896]: Failed password for invalid user apolo from 159.89.88.119 port 53296 ssh2
2020-05-08T07:11:57.2775251495-001 sshd[22010]: Invalid user jean from 159.89.88.119 port 58172
...
2020-05-08 20:09:16
103.130.141.72 attackspam
May  8 01:51:46 firewall sshd[27434]: Invalid user sharmistha from 103.130.141.72
May  8 01:51:48 firewall sshd[27434]: Failed password for invalid user sharmistha from 103.130.141.72 port 34728 ssh2
May  8 01:56:21 firewall sshd[27522]: Invalid user mysql from 103.130.141.72
...
2020-05-08 19:59:16

Recently Reported IPs

166.184.242.157 126.236.205.226 114.102.202.163 172.138.51.172
150.73.47.75 1.230.218.227 106.123.210.18 34.219.227.255
188.81.138.206 36.218.16.234 36.195.232.75 50.150.254.240
150.186.228.85 48.108.250.212 106.88.244.139 56.179.62.57
205.126.60.98 64.171.27.226 59.204.20.86 25.221.187.186