Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.142.244.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.142.244.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:41:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
130.244.142.2.in-addr.arpa domain name pointer 130.red-2-142-244.dynamicip.rima-tde.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.244.142.2.in-addr.arpa	name = 130.red-2-142-244.dynamicip.rima-tde.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.93.25 attack
$f2bV_matches
2020-04-30 01:42:50
38.73.238.138 attack
Failed password for postgres from 38.73.238.138 port 39572 ssh2
2020-04-30 01:52:36
80.82.64.219 attack
port
2020-04-30 02:15:13
212.64.59.227 attack
Invalid user yixin from 212.64.59.227 port 16428
2020-04-30 01:55:28
194.1.168.36 attackspambots
Apr 29 17:49:30 ip-172-31-61-156 sshd[24016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.168.36
Apr 29 17:49:30 ip-172-31-61-156 sshd[24016]: Invalid user bot from 194.1.168.36
Apr 29 17:49:32 ip-172-31-61-156 sshd[24016]: Failed password for invalid user bot from 194.1.168.36 port 40022 ssh2
Apr 29 17:53:25 ip-172-31-61-156 sshd[24134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.168.36  user=root
Apr 29 17:53:27 ip-172-31-61-156 sshd[24134]: Failed password for root from 194.1.168.36 port 49752 ssh2
...
2020-04-30 01:56:31
61.133.232.249 attackbotsspam
Invalid user box from 61.133.232.249 port 58281
2020-04-30 01:49:04
182.254.154.89 attack
Invalid user zabbix from 182.254.154.89 port 35038
2020-04-30 01:58:58
89.176.9.98 attack
Invalid user yb from 89.176.9.98 port 34654
2020-04-30 02:14:15
103.45.101.7 attackbots
Invalid user admin from 103.45.101.7 port 44420
2020-04-30 01:43:54
124.122.4.71 attack
Failed password for postgres from 124.122.4.71 port 46234 ssh2
2020-04-30 02:08:32
177.0.157.142 attackspam
Failed password for root from 177.0.157.142 port 34532 ssh2
2020-04-30 02:02:05
101.99.12.77 attackspambots
Unauthorized connection attempt from IP address 101.99.12.77 on Port 445(SMB)
2020-04-30 02:23:25
119.28.194.81 attackbotsspam
Failed password for root from 119.28.194.81 port 57702 ssh2
2020-04-30 02:09:23
43.243.214.42 attack
Invalid user hh from 43.243.214.42 port 36058
2020-04-30 02:20:38
139.59.85.120 attack
Apr 29 19:39:06 host sshd[19915]: Invalid user ssha from 139.59.85.120 port 35311
...
2020-04-30 02:05:58

Recently Reported IPs

180.254.87.61 67.30.67.245 249.119.71.231 225.25.74.112
232.157.237.78 52.131.140.220 27.231.193.222 236.117.248.113
115.153.244.26 224.217.148.170 224.191.154.2 61.106.121.138
44.153.46.194 55.14.154.33 97.120.184.251 34.2.242.210
76.35.199.183 165.121.200.105 124.71.35.152 55.148.104.244