Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pittsburgh

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.49.8.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.49.8.201.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100100 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 01:18:58 CST 2020
;; MSG SIZE  rcvd: 116
Host info
201.8.49.130.in-addr.arpa domain name pointer cl-130-49-8-201.wireless.pitt.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.8.49.130.in-addr.arpa	name = cl-130-49-8-201.wireless.pitt.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.152.124.21 attack
$f2bV_matches
2020-01-10 15:15:24
222.186.175.181 attackspambots
Jan 10 07:18:20 MK-Soft-VM7 sshd[17118]: Failed password for root from 222.186.175.181 port 41469 ssh2
Jan 10 07:18:22 MK-Soft-VM7 sshd[17118]: Failed password for root from 222.186.175.181 port 41469 ssh2
...
2020-01-10 14:53:46
199.195.251.227 attackspambots
3x Failed Password
2020-01-10 15:23:03
87.103.214.172 attackbots
01/10/2020-05:55:14.170857 87.103.214.172 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-01-10 15:16:33
63.81.87.180 attackbotsspam
Jan 10 05:55:24 smtp postfix/smtpd[44711]: NOQUEUE: reject: RCPT from energetic.jcnovel.com[63.81.87.180]: 554 5.7.1 Service unavailable; Client host [63.81.87.180] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2020-01-10 15:08:40
222.186.180.17 attackbotsspam
2020-01-10T02:10:51.739854xentho-1 sshd[456466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2020-01-10T02:10:53.545816xentho-1 sshd[456466]: Failed password for root from 222.186.180.17 port 30040 ssh2
2020-01-10T02:10:58.302908xentho-1 sshd[456466]: Failed password for root from 222.186.180.17 port 30040 ssh2
2020-01-10T02:10:51.739854xentho-1 sshd[456466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2020-01-10T02:10:53.545816xentho-1 sshd[456466]: Failed password for root from 222.186.180.17 port 30040 ssh2
2020-01-10T02:10:58.302908xentho-1 sshd[456466]: Failed password for root from 222.186.180.17 port 30040 ssh2
2020-01-10T02:10:51.739854xentho-1 sshd[456466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2020-01-10T02:10:53.545816xentho-1 sshd[456466]: Failed password for ro
...
2020-01-10 15:13:03
61.177.172.128 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
Failed password for root from 61.177.172.128 port 18817 ssh2
Failed password for root from 61.177.172.128 port 18817 ssh2
Failed password for root from 61.177.172.128 port 18817 ssh2
Failed password for root from 61.177.172.128 port 18817 ssh2
2020-01-10 15:11:20
173.86.82.146 attackbots
*Port Scan* detected from 173.86.82.146 (US/United States/static-173-86-82-146.dr01.aurr.mn.frontiernet.net). 4 hits in the last 145 seconds
2020-01-10 15:26:40
164.132.62.233 attackspambots
Tried sshing with brute force.
2020-01-10 15:11:58
198.57.203.54 attack
Jan 10 06:28:42 [host] sshd[16761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.57.203.54  user=root
Jan 10 06:28:44 [host] sshd[16761]: Failed password for root from 198.57.203.54 port 57922 ssh2
Jan 10 06:31:39 [host] sshd[16810]: Invalid user xye from 198.57.203.54
2020-01-10 14:48:44
182.253.60.98 attackspambots
1578632135 - 01/10/2020 05:55:35 Host: 182.253.60.98/182.253.60.98 Port: 445 TCP Blocked
2020-01-10 15:05:53
69.55.49.104 attack
Automatic report - XMLRPC Attack
2020-01-10 14:53:15
183.88.242.22 attackbotsspam
Unauthorized connection attempt detected from IP address 183.88.242.22 to port 445
2020-01-10 14:55:53
181.115.248.190 attackbotsspam
Jan 10 04:55:42 IngegnereFirenze sshd[19993]: Failed password for invalid user test from 181.115.248.190 port 5758 ssh2
...
2020-01-10 14:59:47
139.99.40.27 attack
Jan  9 20:39:08 web9 sshd\[2265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27  user=root
Jan  9 20:39:10 web9 sshd\[2265\]: Failed password for root from 139.99.40.27 port 46998 ssh2
Jan  9 20:42:02 web9 sshd\[2670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27  user=root
Jan  9 20:42:04 web9 sshd\[2670\]: Failed password for root from 139.99.40.27 port 44352 ssh2
Jan  9 20:45:01 web9 sshd\[3106\]: Invalid user ts3 from 139.99.40.27
Jan  9 20:45:01 web9 sshd\[3106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27
2020-01-10 15:03:09

Recently Reported IPs

100.28.251.205 55.107.20.176 74.10.39.184 17.64.220.131
131.117.14.48 74.50.72.252 38.146.110.31 194.237.203.222
169.117.213.77 64.73.104.42 136.140.218.171 185.62.32.200
53.98.91.12 4.185.91.104 40.12.86.77 125.133.52.238
83.46.58.168 49.88.75.45 92.198.26.183 74.237.23.250