Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Naestved

Region: Zealand

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: Telenor A/S

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.130.162.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6631
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.130.162.25.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 07 04:39:54 CST 2019
;; MSG SIZE  rcvd: 116

Host info
25.162.130.2.in-addr.arpa domain name pointer 002130162025.mbb.telenor.dk.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
25.162.130.2.in-addr.arpa	name = 002130162025.mbb.telenor.dk.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
122.128.212.74 attackbotsspam
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-14 16:34:38
88.102.244.211 attackspambots
Feb 14 05:55:14 MK-Soft-VM4 sshd[24557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.102.244.211 
Feb 14 05:55:16 MK-Soft-VM4 sshd[24557]: Failed password for invalid user zhu from 88.102.244.211 port 35122 ssh2
...
2020-02-14 15:55:38
222.186.3.21 attackspam
Feb 14 05:55:43 debian-2gb-nbg1-2 kernel: \[3915369.045546\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.186.3.21 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=110 ID=256 PROTO=TCP SPT=32662 DPT=2433 WINDOW=16384 RES=0x00 SYN URGP=0
2020-02-14 16:05:11
113.160.241.226 attackbotsspam
$f2bV_matches
2020-02-14 15:59:24
189.5.161.144 attackspambots
Invalid user Gingers from 189.5.161.144 port 49830
2020-02-14 16:34:03
36.234.207.80 attackbots
20/2/13@23:55:13: FAIL: Alarm-Network address from=36.234.207.80
20/2/13@23:55:13: FAIL: Alarm-Network address from=36.234.207.80
...
2020-02-14 16:31:11
142.93.212.131 attackspambots
Feb 14 07:47:51 server sshd\[18559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131  user=root
Feb 14 07:47:53 server sshd\[18559\]: Failed password for root from 142.93.212.131 port 43070 ssh2
Feb 14 07:54:38 server sshd\[19426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131  user=root
Feb 14 07:54:40 server sshd\[19426\]: Failed password for root from 142.93.212.131 port 39034 ssh2
Feb 14 07:55:37 server sshd\[19916\]: Invalid user cstrike from 142.93.212.131
...
2020-02-14 16:09:26
177.157.97.139 attackspambots
Honeypot attack, port: 81, PTR: 177.157.97.139.dynamic.adsl.gvt.net.br.
2020-02-14 16:33:31
117.4.247.208 attackbots
Honeypot attack, port: 445, PTR: localhost.
2020-02-14 16:25:51
187.0.221.222 attack
Invalid user vnc from 187.0.221.222 port 20023
2020-02-14 16:24:11
51.68.47.44 attackbotsspam
Feb 14 07:30:43 l02a sshd[28275]: Invalid user motion from 51.68.47.44
Feb 14 07:30:43 l02a sshd[28275]: Invalid user motion from 51.68.47.44
Feb 14 07:30:45 l02a sshd[28275]: Failed password for invalid user motion from 51.68.47.44 port 50786 ssh2
2020-02-14 16:12:15
118.70.128.211 attackspam
3389BruteforceStormFW21
2020-02-14 15:59:04
222.186.52.139 attack
14.02.2020 08:39:08 SSH access blocked by firewall
2020-02-14 16:39:51
192.99.31.122 attackbotsspam
192.99.31.122 has been banned for [WebApp Attack]
...
2020-02-14 16:06:06
119.41.15.165 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 16:35:47

Recently Reported IPs

153.177.15.149 173.82.168.192 193.64.71.234 70.67.108.157
88.249.51.64 111.200.178.92 177.159.121.130 126.25.248.55
195.228.31.81 74.19.66.80 218.161.71.205 114.213.202.222
4.134.33.143 103.194.14.232 180.152.83.229 171.226.10.192
190.33.56.188 201.226.253.58 109.116.204.63 104.35.88.108