Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.253.234.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.253.234.130.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011501 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 06:22:53 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 130.234.253.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.234.253.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.143.228.80 attack
Unauthorized connection attempt detected from IP address 187.143.228.80 to port 445
2020-01-06 03:47:35
89.228.214.100 attackspambots
Unauthorized connection attempt detected from IP address 89.228.214.100 to port 445
2020-01-06 03:26:09
3.233.234.238 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-01-06 03:33:45
201.69.204.201 attackbots
Unauthorized connection attempt detected from IP address 201.69.204.201 to port 80
2020-01-06 03:39:43
93.118.186.105 attack
Unauthorized connection attempt detected from IP address 93.118.186.105 to port 23 [J]
2020-01-06 03:25:48
200.48.240.43 attack
Unauthorized connection attempt detected from IP address 200.48.240.43 to port 23
2020-01-06 03:41:04
200.236.122.232 attack
Unauthorized connection attempt detected from IP address 200.236.122.232 to port 23
2020-01-06 03:40:31
222.186.30.248 attack
Jan  5 20:29:55 MK-Soft-VM6 sshd[21448]: Failed password for root from 222.186.30.248 port 16525 ssh2
Jan  5 20:29:57 MK-Soft-VM6 sshd[21448]: Failed password for root from 222.186.30.248 port 16525 ssh2
...
2020-01-06 03:34:42
177.27.200.167 attack
Unauthorized connection attempt detected from IP address 177.27.200.167 to port 80
2020-01-06 03:20:15
217.216.12.151 attackbots
Unauthorized connection attempt detected from IP address 217.216.12.151 to port 23
2020-01-06 03:36:35
186.34.4.40 attack
Unauthorized connection attempt detected from IP address 186.34.4.40 to port 23 [J]
2020-01-06 03:16:18
213.66.135.39 attackbotsspam
Unauthorized connection attempt detected from IP address 213.66.135.39 to port 5555
2020-01-06 03:38:06
112.161.54.210 attackspambots
Unauthorized connection attempt detected from IP address 112.161.54.210 to port 81
2020-01-06 03:24:19
181.57.208.226 attackspambots
Unauthorized connection attempt detected from IP address 181.57.208.226 to port 23 [J]
2020-01-06 03:17:42
154.47.130.85 attackbots
Unauthorized connection attempt detected from IP address 154.47.130.85 to port 80
2020-01-06 03:50:47

Recently Reported IPs

23.12.198.101 54.116.120.162 222.89.167.22 30.122.108.254
157.87.224.182 19.202.128.143 119.143.90.188 117.244.4.137
243.4.17.16 58.58.151.154 178.60.217.171 103.196.150.247
145.205.91.175 61.85.32.2 48.27.65.231 181.193.29.45
22.212.125.99 131.226.58.159 146.193.89.31 15.210.64.170