Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pittsburgh

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.49.180.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.49.180.163.			IN	A

;; AUTHORITY SECTION:
.			104	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010401 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 05 10:53:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 163.180.49.130.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 163.180.49.130.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.61.134.60 attackspambots
Jul 20 17:46:32 vibhu-HP-Z238-Microtower-Workstation sshd\[4970\]: Invalid user basic from 93.61.134.60
Jul 20 17:46:32 vibhu-HP-Z238-Microtower-Workstation sshd\[4970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.61.134.60
Jul 20 17:46:34 vibhu-HP-Z238-Microtower-Workstation sshd\[4970\]: Failed password for invalid user basic from 93.61.134.60 port 55718 ssh2
Jul 20 17:51:25 vibhu-HP-Z238-Microtower-Workstation sshd\[5279\]: Invalid user ts3 from 93.61.134.60
Jul 20 17:51:25 vibhu-HP-Z238-Microtower-Workstation sshd\[5279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.61.134.60
...
2019-07-20 20:22:04
119.108.63.127 attackbotsspam
23/tcp
[2019-07-20]1pkt
2019-07-20 21:06:01
115.28.212.181 attackbotsspam
Wordpress XMLRPC attack
2019-07-20 20:59:38
193.112.19.168 attack
Invalid user donut from 193.112.19.168 port 45432
2019-07-20 20:20:27
188.214.30.6 attack
Wordpress attack
2019-07-20 21:09:13
84.242.96.142 attackbots
Jul 20 08:35:32 debian sshd\[18432\]: Invalid user localhost from 84.242.96.142 port 50204
Jul 20 08:35:32 debian sshd\[18432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
Jul 20 08:35:35 debian sshd\[18432\]: Failed password for invalid user localhost from 84.242.96.142 port 50204 ssh2
...
2019-07-20 20:39:33
49.204.221.238 attackbots
445/tcp
[2019-07-20]1pkt
2019-07-20 21:04:00
162.243.144.171 attackspambots
23127/tcp 8945/tcp 7199/tcp...
[2019-05-19/07-20]79pkt,62pt.(tcp),8pt.(udp)
2019-07-20 20:36:03
103.92.122.204 attackspam
445/tcp
[2019-07-20]1pkt
2019-07-20 20:42:04
49.81.92.16 attack
NOQUEUE: reject: RCPT from unknown\[49.81.92.16\]: 554 5.7.1 Service unavailable\; host \[49.81.92.16\] blocked using sbl-xbl.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS
2019-07-20 21:08:49
192.99.175.186 attackbots
8291/tcp 21/tcp 23/tcp...
[2019-05-20/07-20]26pkt,13pt.(tcp)
2019-07-20 20:23:00
180.76.15.12 attackspambots
Automatic report - Banned IP Access
2019-07-20 21:04:59
188.166.229.205 attack
Jul 20 11:12:02 XXXXXX sshd[2097]: Invalid user ayesha from 188.166.229.205 port 52580
2019-07-20 21:05:37
102.133.227.228 attack
123/udp
[2019-07-20]1pkt
2019-07-20 20:52:19
96.76.194.78 attackspam
RDP Bruteforce
2019-07-20 21:10:10

Recently Reported IPs

243.150.177.210 252.124.95.178 52.12.160.29 181.39.125.175
167.168.48.220 201.36.117.167 133.111.217.152 178.147.199.163
157.70.128.140 220.231.187.166 232.202.216.129 123.63.60.253
155.178.148.113 167.191.80.14 4.252.99.75 18.30.78.1
35.30.114.150 251.182.210.82 236.208.212.52 194.210.190.131