Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.98.145.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38815
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.98.145.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:36:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 130.145.98.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.145.98.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.106.122.3 attack
WordPress wp-login brute force :: 85.106.122.3 0.164 BYPASS [30/Jul/2019:03:34:51  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-30 07:32:53
1.180.64.86 attack
Brute force attack stopped by firewall
2019-07-30 07:25:33
106.12.213.163 attackbotsspam
Jul 29 19:35:17 [munged] sshd[14731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.163  user=root
Jul 29 19:35:19 [munged] sshd[14731]: Failed password for root from 106.12.213.163 port 60140 ssh2
2019-07-30 07:22:22
190.145.55.89 attackbotsspam
Jul 30 00:09:13 localhost sshd\[39526\]: Invalid user bots from 190.145.55.89 port 49108
Jul 30 00:09:13 localhost sshd\[39526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.55.89
...
2019-07-30 07:10:59
201.49.127.212 attackspam
Jul 30 00:52:36 vps691689 sshd[25543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
Jul 30 00:52:38 vps691689 sshd[25543]: Failed password for invalid user postgres from 201.49.127.212 port 47054 ssh2
Jul 30 00:58:07 vps691689 sshd[25571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
...
2019-07-30 07:11:47
60.250.67.47 attack
Jul 29 22:05:21 MK-Soft-VM7 sshd\[15535\]: Invalid user git321 from 60.250.67.47 port 46504
Jul 29 22:05:21 MK-Soft-VM7 sshd\[15535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.67.47
Jul 29 22:05:23 MK-Soft-VM7 sshd\[15535\]: Failed password for invalid user git321 from 60.250.67.47 port 46504 ssh2
...
2019-07-30 07:27:20
23.254.226.161 attack
1564421759 - 07/29/2019 19:35:59 Host: 23.254.226.161/23.254.226.161 Port: 7 UDP Blocked
2019-07-30 07:03:07
188.227.194.15 attackbotsspam
IP: 188.227.194.15
ASN: AS49628 LLC Skytel
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:34:31 PM UTC
2019-07-30 07:41:17
193.56.28.109 attackbots
IP: 193.56.28.109
ASN: AS197226 sprint S.A.
Port: Message Submission 587
Found in one or more Blacklists
Date: 29/07/2019 5:34:36 PM UTC
2019-07-30 07:38:05
195.123.214.238 attack
codzienny-newsletter.co.pl  it sends spam
2019-07-30 07:01:20
51.77.145.154 attack
Jul 29 22:28:02 lnxded63 sshd[20228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.145.154
2019-07-30 07:08:29
197.26.73.85 attack
Automatic report - Port Scan Attack
2019-07-30 06:54:20
45.31.122.143 attackbots
Jul 30 00:50:07 srv-4 sshd\[18101\]: Invalid user pi from 45.31.122.143
Jul 30 00:50:07 srv-4 sshd\[18102\]: Invalid user pi from 45.31.122.143
Jul 30 00:50:07 srv-4 sshd\[18101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.31.122.143
...
2019-07-30 07:01:36
46.98.134.131 attackbots
IP: 46.98.134.131
ASN: AS15377 ISP Fregat Ltd.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:35:33 PM UTC
2019-07-30 07:17:20
41.59.63.190 attack
IP: 41.59.63.190
ASN: AS33765 TTCLDATA
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:35:23 PM UTC
2019-07-30 07:21:31

Recently Reported IPs

171.154.7.202 31.214.56.3 245.27.91.241 70.25.255.250
104.44.16.149 179.89.10.135 153.56.62.19 230.32.249.156
183.218.82.63 18.146.239.104 129.214.16.45 44.41.95.229
15.26.194.222 122.218.234.162 139.200.118.115 193.138.8.144
20.228.84.74 98.91.226.27 245.237.36.128 119.223.214.69