Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Springfield

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.227.109.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.227.109.130.		IN	A

;; AUTHORITY SECTION:
.			554	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023020701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 08 07:09:10 CST 2023
;; MSG SIZE  rcvd: 108
Host info
130.109.227.136.in-addr.arpa domain name pointer internal.Wittenberg.EDU.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.109.227.136.in-addr.arpa	name = internal.Wittenberg.EDU.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.82.49.178 attackspambots
Email Spam
2020-03-23 09:11:26
63.82.48.169 attackbots
Email Spam
2020-03-23 09:14:27
52.231.70.233 attackbots
honeypot 22 port
2020-03-23 09:21:49
51.89.149.213 attack
Mar 23 00:48:43 eventyay sshd[17949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213
Mar 23 00:48:45 eventyay sshd[17949]: Failed password for invalid user admin from 51.89.149.213 port 32830 ssh2
Mar 23 00:52:53 eventyay sshd[18046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.149.213
...
2020-03-23 09:28:28
159.65.84.164 attackbots
Mar 23 08:14:12 webhost01 sshd[28471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.84.164
Mar 23 08:14:14 webhost01 sshd[28471]: Failed password for invalid user azureuser from 159.65.84.164 port 58962 ssh2
...
2020-03-23 09:22:38
111.13.60.33 attack
ICMP MH Probe, Scan /Distributed -
2020-03-23 09:21:22
188.166.150.17 attackbots
Mar 22 22:35:17 ws22vmsma01 sshd[120331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.17
Mar 22 22:35:19 ws22vmsma01 sshd[120331]: Failed password for invalid user hf from 188.166.150.17 port 33658 ssh2
...
2020-03-23 09:41:24
167.99.66.193 attackspambots
Mar 23 00:00:15 pkdns2 sshd\[11030\]: Invalid user sqsysop from 167.99.66.193Mar 23 00:00:17 pkdns2 sshd\[11030\]: Failed password for invalid user sqsysop from 167.99.66.193 port 56472 ssh2Mar 23 00:02:00 pkdns2 sshd\[11076\]: Invalid user iryl from 167.99.66.193Mar 23 00:02:02 pkdns2 sshd\[11076\]: Failed password for invalid user iryl from 167.99.66.193 port 43331 ssh2Mar 23 00:03:51 pkdns2 sshd\[11166\]: Invalid user kerrin from 167.99.66.193Mar 23 00:03:52 pkdns2 sshd\[11166\]: Failed password for invalid user kerrin from 167.99.66.193 port 58424 ssh2
...
2020-03-23 09:24:42
63.82.48.6 attack
Email Spam
2020-03-23 09:19:46
110.53.234.97 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-03-23 09:26:29
63.82.48.140 attack
Email Spam
2020-03-23 09:15:13
142.44.184.156 attack
Mar 23 00:48:45 mail sshd[7577]: Invalid user mshan from 142.44.184.156
Mar 23 00:48:45 mail sshd[7577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.156
Mar 23 00:48:47 mail sshd[7577]: Failed password for invalid user mshan from 142.44.184.156 port 45030 ssh2
Mar 23 00:48:47 mail sshd[7577]: Received disconnect from 142.44.184.156 port 45030:11: Bye Bye [preauth]
Mar 23 00:48:47 mail sshd[7577]: Disconnected from 142.44.184.156 port 45030 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=142.44.184.156
2020-03-23 09:22:53
134.73.51.54 attackbots
Email Spam
2020-03-23 09:03:32
167.172.220.247 attack
20/3/22@20:03:41: FAIL: Alarm-Intrusion address from=167.172.220.247
...
2020-03-23 09:44:39
63.83.78.207 attackspambots
Email Spam
2020-03-23 09:10:49

Recently Reported IPs

113.220.201.190 141.150.206.241 172.105.161.87 106.66.6.83
0.42.51.242 123.92.8.204 183.111.105.145 183.111.105.152
49.247.35.146 160.96.18.7 183.111.105.141 49.247.34.38
52.79.53.3 58.151.146.181 242.219.209.178 102.108.242.160
198.212.39.47 197.63.165.118 104.144.130.7 20.252.153.198