Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.197.193.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.197.193.130.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 04:10:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 130.193.197.141.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 130.193.197.141.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
110.93.200.118 attackbots
Jun  2 06:27:35 piServer sshd[23163]: Failed password for root from 110.93.200.118 port 27952 ssh2
Jun  2 06:30:10 piServer sshd[23388]: Failed password for root from 110.93.200.118 port 20533 ssh2
...
2020-06-02 12:35:21
222.190.145.130 attack
Jun  2 05:52:30 vps647732 sshd[16667]: Failed password for root from 222.190.145.130 port 47424 ssh2
...
2020-06-02 12:08:23
200.119.112.204 attackspambots
Jun  2 05:55:25 vmd48417 sshd[1514]: Failed password for root from 200.119.112.204 port 45438 ssh2
2020-06-02 12:45:08
222.186.169.192 attackspam
Jun  2 06:11:22 vps sshd[448074]: Failed password for root from 222.186.169.192 port 8614 ssh2
Jun  2 06:11:26 vps sshd[448074]: Failed password for root from 222.186.169.192 port 8614 ssh2
Jun  2 06:11:29 vps sshd[448074]: Failed password for root from 222.186.169.192 port 8614 ssh2
Jun  2 06:11:32 vps sshd[448074]: Failed password for root from 222.186.169.192 port 8614 ssh2
Jun  2 06:11:35 vps sshd[448074]: Failed password for root from 222.186.169.192 port 8614 ssh2
...
2020-06-02 12:18:37
222.186.52.39 attack
Jun  2 06:06:27 v22018053744266470 sshd[10111]: Failed password for root from 222.186.52.39 port 63121 ssh2
Jun  2 06:06:35 v22018053744266470 sshd[10121]: Failed password for root from 222.186.52.39 port 32649 ssh2
...
2020-06-02 12:22:12
198.108.67.22 attack
Port scan: Attack repeated for 24 hours
2020-06-02 12:40:26
210.5.151.231 attackspambots
$f2bV_matches
2020-06-02 12:22:39
213.184.249.95 attackspam
$f2bV_matches
2020-06-02 12:37:58
195.38.126.113 attack
Jun  2 03:52:07 marvibiene sshd[11949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.38.126.113  user=root
Jun  2 03:52:10 marvibiene sshd[11949]: Failed password for root from 195.38.126.113 port 7696 ssh2
Jun  2 03:56:07 marvibiene sshd[12091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.38.126.113  user=root
Jun  2 03:56:09 marvibiene sshd[12091]: Failed password for root from 195.38.126.113 port 38668 ssh2
...
2020-06-02 12:20:45
218.92.0.195 attack
06/02/2020-00:34:39.439340 218.92.0.195 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-02 12:35:03
13.68.188.74 attackbots
Fail2Ban Ban Triggered
HTTP Exploit Attempt
2020-06-02 12:05:05
36.153.96.34 attackspam
2020-06-02T03:56:29.637025randservbullet-proofcloud-66.localdomain sshd[18553]: Invalid user pi from 36.153.96.34 port 1600
2020-06-02T03:56:29.645093randservbullet-proofcloud-66.localdomain sshd[18553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.96.34
2020-06-02T03:56:29.637025randservbullet-proofcloud-66.localdomain sshd[18553]: Invalid user pi from 36.153.96.34 port 1600
2020-06-02T03:56:31.451181randservbullet-proofcloud-66.localdomain sshd[18553]: Failed password for invalid user pi from 36.153.96.34 port 1600 ssh2
...
2020-06-02 12:03:43
139.5.154.61 attack
Jun  2 03:51:05 game-panel sshd[14703]: Failed password for root from 139.5.154.61 port 54246 ssh2
Jun  2 03:54:42 game-panel sshd[14847]: Failed password for root from 139.5.154.61 port 58360 ssh2
2020-06-02 12:29:03
103.132.19.246 attackbotsspam
$f2bV_matches
2020-06-02 12:15:20
222.186.175.167 attackbots
Jun  2 06:05:02 server sshd[23218]: Failed none for root from 222.186.175.167 port 60590 ssh2
Jun  2 06:05:04 server sshd[23218]: Failed password for root from 222.186.175.167 port 60590 ssh2
Jun  2 06:05:07 server sshd[23218]: Failed password for root from 222.186.175.167 port 60590 ssh2
2020-06-02 12:07:12

Recently Reported IPs

16.30.80.141 91.134.26.121 193.47.18.140 72.235.255.2
225.225.111.107 232.137.60.182 134.141.108.250 74.176.206.10
217.33.73.120 114.118.219.141 167.170.76.76 18.131.59.72
220.244.241.112 148.116.27.183 133.173.179.192 192.248.86.43
242.77.90.223 191.21.216.89 49.140.161.101 249.160.245.141