Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.148.130.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.148.130.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 08:57:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
99.130.148.144.in-addr.arpa domain name pointer nothing.attdns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.130.148.144.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.175.25.53 attack
$f2bV_matches
2019-10-24 22:32:31
192.228.100.222 attackbots
Invalid user DUP from 192.228.100.222 port 49486
2019-10-24 22:04:02
129.211.80.201 attack
Invalid user pimp from 129.211.80.201 port 64205
2019-10-24 22:10:51
80.20.125.243 attackbotsspam
Invalid user jboss from 80.20.125.243 port 46142
2019-10-24 22:21:22
93.74.162.49 attack
Invalid user user from 93.74.162.49 port 36790
2019-10-24 22:19:13
80.244.179.6 attack
Oct 24 04:07:53 web1 sshd\[18284\]: Invalid user !@\#123qweQWE from 80.244.179.6
Oct 24 04:07:53 web1 sshd\[18284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
Oct 24 04:07:55 web1 sshd\[18284\]: Failed password for invalid user !@\#123qweQWE from 80.244.179.6 port 57856 ssh2
Oct 24 04:11:41 web1 sshd\[18621\]: Invalid user stephanie from 80.244.179.6
Oct 24 04:11:41 web1 sshd\[18621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.244.179.6
2019-10-24 22:20:54
42.116.255.216 attackspambots
Oct 24 15:36:16 vmd17057 sshd\[27634\]: Invalid user ubuntu from 42.116.255.216 port 45429
Oct 24 15:36:16 vmd17057 sshd\[27634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.116.255.216
Oct 24 15:36:18 vmd17057 sshd\[27634\]: Failed password for invalid user ubuntu from 42.116.255.216 port 45429 ssh2
...
2019-10-24 21:58:16
221.226.63.54 attackspambots
2019-10-24T13:20:27.751739Z ea472e28ef64 New connection: 221.226.63.54:47075 (172.17.0.3:2222) [session: ea472e28ef64]
2019-10-24T13:34:27.159065Z 02320beca8dd New connection: 221.226.63.54:43802 (172.17.0.3:2222) [session: 02320beca8dd]
2019-10-24 22:29:02
102.165.35.137 attackbotsspam
Invalid user admin from 102.165.35.137 port 2647
2019-10-24 22:17:39
77.89.54.206 attack
Invalid user rabbitmq from 77.89.54.206 port 33652
2019-10-24 22:21:55
159.65.146.232 attackspam
Invalid user webmail from 159.65.146.232 port 40760
2019-10-24 22:35:58
184.82.50.147 attackbots
Invalid user admin from 184.82.50.147 port 52554
2019-10-24 22:06:22
51.68.136.168 attackbotsspam
$f2bV_matches
2019-10-24 21:57:11
138.68.242.220 attackbots
Oct 24 15:17:56 server sshd\[8588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220  user=root
Oct 24 15:17:58 server sshd\[8588\]: Failed password for root from 138.68.242.220 port 57986 ssh2
Oct 24 15:23:37 server sshd\[9897\]: Invalid user jomar from 138.68.242.220
Oct 24 15:23:37 server sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220 
Oct 24 15:23:39 server sshd\[9897\]: Failed password for invalid user jomar from 138.68.242.220 port 39742 ssh2
...
2019-10-24 22:09:27
49.204.76.142 attackbots
Invalid user appltest from 49.204.76.142 port 34667
2019-10-24 21:57:27

Recently Reported IPs

236.37.180.58 143.55.17.78 61.30.249.52 37.39.27.103
236.148.33.60 32.192.21.175 253.158.244.144 51.60.206.251
255.112.99.217 106.65.152.233 152.186.157.108 163.205.68.36
99.39.156.238 127.85.133.114 250.203.229.49 6.126.184.98
61.224.27.250 87.254.56.60 149.62.55.32 6.182.31.46