Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Queensland

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.130.4.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.130.4.4.			IN	A

;; AUTHORITY SECTION:
.			179	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023072002 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 21 12:02:57 CST 2023
;; MSG SIZE  rcvd: 104
Host info
4.4.130.139.in-addr.arpa domain name pointer uneeda.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.4.130.139.in-addr.arpa	name = uneeda.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.82.106.238 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-15 02:32:02
66.212.195.79 attackbotsspam
Automatic report - Banned IP Access
2020-08-15 02:43:11
170.130.126.96 attackbotsspam
[Fri Aug 14 07:18:21.969629 2020] [php7:error] [pid 63306] [client 170.130.126.96:59130] script /Library/Server/Web/Data/Sites/customvisuals.com/blog/wp-login.php not found or unable to stat
2020-08-15 02:50:30
85.209.0.86 attack
Aug 14 12:20:41 *** sshd[24920]: Did not receive identification string from 85.209.0.86
2020-08-15 03:02:17
128.199.142.138 attackbotsspam
Aug 14 16:26:15 vps sshd[1025149]: Failed password for invalid user Asdfg%TGB123 from 128.199.142.138 port 48686 ssh2
Aug 14 16:30:19 vps sshd[1046148]: Invalid user %username%qwert from 128.199.142.138 port 57634
Aug 14 16:30:19 vps sshd[1046148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Aug 14 16:30:21 vps sshd[1046148]: Failed password for invalid user %username%qwert from 128.199.142.138 port 57634 ssh2
Aug 14 16:34:27 vps sshd[15694]: Invalid user qwert@123123 from 128.199.142.138 port 38322
...
2020-08-15 03:01:23
85.93.49.6 attack
1597407636 - 08/14/2020 14:20:36 Host: 85.93.49.6/85.93.49.6 Port: 445 TCP Blocked
2020-08-15 03:07:28
165.227.117.255 attackbots
Repeated brute force against a port
2020-08-15 03:09:37
58.16.145.208 attackbots
"fail2ban match"
2020-08-15 03:00:36
200.146.227.146 attack
Unauthorized connection attempt from IP address 200.146.227.146 on port 993
2020-08-15 02:57:05
93.125.114.95 attackbots
Aug 14 12:02:57 ws24vmsma01 sshd[111687]: Failed password for root from 93.125.114.95 port 33052 ssh2
...
2020-08-15 02:51:20
170.130.140.167 attack
spam (f2b h1)
2020-08-15 02:37:59
103.205.180.188 attackbotsspam
Aug 14 20:21:54 inter-technics sshd[29343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.180.188  user=root
Aug 14 20:21:55 inter-technics sshd[29343]: Failed password for root from 103.205.180.188 port 55532 ssh2
Aug 14 20:26:32 inter-technics sshd[29653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.180.188  user=root
Aug 14 20:26:35 inter-technics sshd[29653]: Failed password for root from 103.205.180.188 port 37624 ssh2
Aug 14 20:31:08 inter-technics sshd[29969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.180.188  user=root
Aug 14 20:31:10 inter-technics sshd[29969]: Failed password for root from 103.205.180.188 port 47948 ssh2
...
2020-08-15 03:01:54
177.37.160.175 attack
20/8/14@08:21:10: FAIL: Alarm-Network address from=177.37.160.175
20/8/14@08:21:10: FAIL: Alarm-Network address from=177.37.160.175
...
2020-08-15 02:45:27
151.62.76.109 attack
$f2bV_matches
2020-08-15 02:51:02
188.170.13.225 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-08-15 02:57:53

Recently Reported IPs

179.126.121.196 228.205.84.16 186.49.12.49 92.63.196.80
41.4.216.24 197.61.35.134 157.245.63.144 194.146.110.117
139.162.33.106 196.30.193.226 180.191.11.102 180.191.20.1
179.215.117.31 180.252.91.196 122.230.32.35 129.70.145.128
199.26.100.15 45.110.129.130 14.119.104.254 102.80.45.25