Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vienna

Region: Wien

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.130.124.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.130.124.213.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050200 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 15:02:09 CST 2023
;; MSG SIZE  rcvd: 108
Host info
213.124.130.131.in-addr.arpa domain name pointer dfanalysis.cs.univie.ac.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.124.130.131.in-addr.arpa	name = dfanalysis.cs.univie.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.94.46.26 attackspam
Email rejected due to spam filtering
2020-05-13 08:37:54
195.54.167.85 attack
Attempted connection to port 22.
2020-05-13 08:38:47
211.159.186.92 attack
May 12 23:53:33 vps647732 sshd[21524]: Failed password for root from 211.159.186.92 port 33986 ssh2
...
2020-05-13 08:29:21
111.229.118.227 attackbotsspam
May 13 00:06:24 lukav-desktop sshd\[841\]: Invalid user schaal from 111.229.118.227
May 13 00:06:24 lukav-desktop sshd\[841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.118.227
May 13 00:06:26 lukav-desktop sshd\[841\]: Failed password for invalid user schaal from 111.229.118.227 port 34548 ssh2
May 13 00:11:33 lukav-desktop sshd\[16740\]: Invalid user ryan from 111.229.118.227
May 13 00:11:33 lukav-desktop sshd\[16740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.118.227
2020-05-13 08:01:22
203.162.54.247 attack
Scanned 3 times in the last 24 hours on port 22
2020-05-13 08:34:47
129.204.188.93 attackbots
$f2bV_matches
2020-05-13 08:33:28
180.68.48.238 attack
Telnet Server BruteForce Attack
2020-05-13 07:58:32
49.234.7.196 attackspambots
$f2bV_matches
2020-05-13 08:35:49
183.111.206.111 attackbots
May 12 23:37:07 plex sshd[15045]: Invalid user musikbot from 183.111.206.111 port 17988
2020-05-13 08:30:08
134.175.177.21 attack
2020-05-12T21:25:03.284922abusebot-6.cloudsearch.cf sshd[1983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.177.21  user=root
2020-05-12T21:25:04.899602abusebot-6.cloudsearch.cf sshd[1983]: Failed password for root from 134.175.177.21 port 42294 ssh2
2020-05-12T21:29:18.757632abusebot-6.cloudsearch.cf sshd[2239]: Invalid user admin from 134.175.177.21 port 49742
2020-05-12T21:29:18.765141abusebot-6.cloudsearch.cf sshd[2239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.177.21
2020-05-12T21:29:18.757632abusebot-6.cloudsearch.cf sshd[2239]: Invalid user admin from 134.175.177.21 port 49742
2020-05-12T21:29:21.052557abusebot-6.cloudsearch.cf sshd[2239]: Failed password for invalid user admin from 134.175.177.21 port 49742 ssh2
2020-05-12T21:33:19.145314abusebot-6.cloudsearch.cf sshd[2439]: Invalid user weblogic from 134.175.177.21 port 57182
...
2020-05-13 08:04:14
117.28.254.143 attackspambots
TCP src-port=60886   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious & Spammer)   (109)
2020-05-13 08:03:19
189.112.12.107 attackbotsspam
May 12 19:13:40 NPSTNNYC01T sshd[29676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
May 12 19:13:42 NPSTNNYC01T sshd[29676]: Failed password for invalid user ubuntu from 189.112.12.107 port 53089 ssh2
May 12 19:18:16 NPSTNNYC01T sshd[30115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.12.107
...
2020-05-13 08:39:30
157.230.226.254 attackspam
Invalid user segelinde from 157.230.226.254 port 42244
2020-05-13 08:00:47
189.208.189.164 attack
Automatic report - Port Scan Attack
2020-05-13 08:10:26
222.220.230.180 attackbotsspam
05/12/2020-17:11:25.860442 222.220.230.180 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-05-13 08:05:06

Recently Reported IPs

140.116.210.49 140.116.91.169 124.17.34.67 140.116.113.146
140.116.127.16 140.116.12.123 140.116.194.91 140.116.237.161
116.206.31.40 202.67.42.29 202.154.58.10 200.106.248.7
140.116.40.52 140.116.190.167 114.79.38.60 140.116.82.244
140.116.102.219 147.231.19.178 210.73.8.179 124.16.128.219