Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zürich

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.60.191.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.60.191.140.			IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 15:17:21 CST 2023
;; MSG SIZE  rcvd: 107
Host info
140.191.60.130.in-addr.arpa is an alias for 140.128-28.191.60.130.in-addr.arpa.
140.128-28.191.60.130.in-addr.arpa domain name pointer consensus-2.ifi.uzh.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.191.60.130.in-addr.arpa	canonical name = 140.128-28.191.60.130.in-addr.arpa.
140.128-28.191.60.130.in-addr.arpa	name = consensus-2.ifi.uzh.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.21.138.116 attackbots
Aug  7 19:44:34 * sshd[17164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.21.138.116
Aug  7 19:44:37 * sshd[17164]: Failed password for invalid user lbiswal from 93.21.138.116 port 57642 ssh2
2019-08-08 03:10:26
114.113.221.162 attackbotsspam
DATE:2019-08-07 19:44:11,IP:114.113.221.162,MATCHES:11,PORT:ssh
2019-08-08 03:18:20
113.57.212.63 attack
Aug  7 17:48:08 sshgateway sshd\[3844\]: Invalid user ubuntu from 113.57.212.63
Aug  7 17:48:08 sshgateway sshd\[3844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.212.63
Aug  7 17:48:10 sshgateway sshd\[3844\]: Failed password for invalid user ubuntu from 113.57.212.63 port 11778 ssh2
2019-08-08 03:12:32
78.188.186.193 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-08-08 02:24:10
178.128.55.52 attackbotsspam
Aug  7 19:45:07 vpn01 sshd\[8948\]: Invalid user mailroom from 178.128.55.52
Aug  7 19:45:07 vpn01 sshd\[8948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.52
Aug  7 19:45:09 vpn01 sshd\[8948\]: Failed password for invalid user mailroom from 178.128.55.52 port 48657 ssh2
2019-08-08 02:56:22
138.197.70.44 attackbots
Aug  8 00:36:46 vibhu-HP-Z238-Microtower-Workstation sshd\[28589\]: Invalid user test from 138.197.70.44
Aug  8 00:36:46 vibhu-HP-Z238-Microtower-Workstation sshd\[28589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.70.44
Aug  8 00:36:48 vibhu-HP-Z238-Microtower-Workstation sshd\[28589\]: Failed password for invalid user test from 138.197.70.44 port 43446 ssh2
Aug  8 00:41:28 vibhu-HP-Z238-Microtower-Workstation sshd\[28758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.70.44  user=root
Aug  8 00:41:30 vibhu-HP-Z238-Microtower-Workstation sshd\[28758\]: Failed password for root from 138.197.70.44 port 39016 ssh2
...
2019-08-08 03:19:45
183.61.109.23 attackbots
Aug  7 14:24:17 vps200512 sshd\[16433\]: Invalid user wille from 183.61.109.23
Aug  7 14:24:17 vps200512 sshd\[16433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23
Aug  7 14:24:20 vps200512 sshd\[16433\]: Failed password for invalid user wille from 183.61.109.23 port 43579 ssh2
Aug  7 14:29:26 vps200512 sshd\[16500\]: Invalid user lab from 183.61.109.23
Aug  7 14:29:26 vps200512 sshd\[16500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.109.23
2019-08-08 02:32:16
113.122.63.216 attackbotsspam
Aug  8 00:44:05 itv-usvr-02 sshd[27199]: Invalid user admin from 113.122.63.216 port 38332
Aug  8 00:44:05 itv-usvr-02 sshd[27199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.122.63.216
Aug  8 00:44:05 itv-usvr-02 sshd[27199]: Invalid user admin from 113.122.63.216 port 38332
Aug  8 00:44:07 itv-usvr-02 sshd[27199]: Failed password for invalid user admin from 113.122.63.216 port 38332 ssh2
Aug  8 00:44:05 itv-usvr-02 sshd[27199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.122.63.216
Aug  8 00:44:05 itv-usvr-02 sshd[27199]: Invalid user admin from 113.122.63.216 port 38332
Aug  8 00:44:07 itv-usvr-02 sshd[27199]: Failed password for invalid user admin from 113.122.63.216 port 38332 ssh2
Aug  8 00:44:09 itv-usvr-02 sshd[27199]: Failed password for invalid user admin from 113.122.63.216 port 38332 ssh2
2019-08-08 03:19:10
146.4.22.190 attack
Automatic report - Web App Attack
2019-08-08 02:16:57
82.151.200.150 attackbotsspam
Aug  7 12:41:50 dx0 kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=00:0c:29:e5:9d:01:00:04:28:09:4c:19:08:00 SRC=82.151.200.150
2019-08-08 02:36:10
207.46.13.155 attackbotsspam
Aug  7 17:45:32   TCP Attack: SRC=207.46.13.155 DST=[Masked] LEN=321 TOS=0x00 PREC=0x00 TTL=100  DF PROTO=TCP SPT=13157 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-08-08 02:46:51
41.35.86.60 attackbots
Aug  7 17:46:11 thevastnessof sshd[29772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.35.86.60
...
2019-08-08 02:28:29
193.201.224.158 attackspambots
Aug  7 20:45:53 server01 sshd\[18133\]: Invalid user admin from 193.201.224.158
Aug  7 20:45:53 server01 sshd\[18133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.158
Aug  7 20:45:56 server01 sshd\[18133\]: Failed password for invalid user admin from 193.201.224.158 port 8314 ssh2
...
2019-08-08 02:35:47
134.73.161.22 attackbotsspam
Aug  7 19:45:57 localhost sshd\[27201\]: Invalid user yasmina from 134.73.161.22 port 53104
Aug  7 19:45:57 localhost sshd\[27201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.22
Aug  7 19:46:00 localhost sshd\[27201\]: Failed password for invalid user yasmina from 134.73.161.22 port 53104 ssh2
2019-08-08 02:34:35
142.93.50.178 attackspam
Aug  7 14:46:49 debian sshd\[2690\]: Invalid user mysql from 142.93.50.178 port 45638
Aug  7 14:46:49 debian sshd\[2690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.50.178
Aug  7 14:46:51 debian sshd\[2690\]: Failed password for invalid user mysql from 142.93.50.178 port 45638 ssh2
...
2019-08-08 02:58:19

Recently Reported IPs

198.27.76.54 212.189.238.76 140.116.241.57 140.116.64.190
140.116.15.172 193.2.132.89 140.116.66.221 209.147.145.181
49.51.8.244 140.117.186.68 202.67.41.23 14.139.40.207
140.116.51.145 140.123.107.93 140.116.196.106 202.245.30.254
120.118.67.195 193.175.73.217 137.44.215.5 88.200.102.119