Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.130.84.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.130.84.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 01:56:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 64.84.130.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.84.130.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.148.142.117 attackbots
www.ft-1848-basketball.de 132.148.142.117 \[12/Jul/2019:14:44:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 2174 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.ft-1848-basketball.de 132.148.142.117 \[12/Jul/2019:14:44:24 +0200\] "POST /wp-login.php HTTP/1.1" 200 2144 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.ft-1848-basketball.de 132.148.142.117 \[12/Jul/2019:14:44:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 2131 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-12 21:35:55
46.3.96.70 attackbotsspam
12.07.2019 13:55:23 Connection to port 19463 blocked by firewall
2019-07-12 22:10:34
119.42.175.200 attack
2019-07-12T13:25:01.650885abusebot-4.cloudsearch.cf sshd\[834\]: Invalid user ts3server from 119.42.175.200 port 47818
2019-07-12 21:36:41
14.169.224.40 attackspam
Automatic report - SSH Brute-Force Attack
2019-07-12 21:43:31
142.93.203.108 attackbots
Jul 12 15:18:00 s64-1 sshd[9319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.203.108
Jul 12 15:18:02 s64-1 sshd[9319]: Failed password for invalid user neel from 142.93.203.108 port 41592 ssh2
Jul 12 15:23:15 s64-1 sshd[9346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.203.108
...
2019-07-12 21:24:51
51.68.198.119 attackbotsspam
Jul 12 15:04:00 localhost sshd\[26382\]: Invalid user webftp from 51.68.198.119 port 55046
Jul 12 15:04:00 localhost sshd\[26382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.119
Jul 12 15:04:02 localhost sshd\[26382\]: Failed password for invalid user webftp from 51.68.198.119 port 55046 ssh2
2019-07-12 21:20:29
116.7.176.7 attackspambots
Jul 12 13:03:23 ip-172-31-62-245 sshd\[3248\]: Invalid user oracle from 116.7.176.7\
Jul 12 13:03:25 ip-172-31-62-245 sshd\[3248\]: Failed password for invalid user oracle from 116.7.176.7 port 38110 ssh2\
Jul 12 13:07:36 ip-172-31-62-245 sshd\[3286\]: Invalid user sp from 116.7.176.7\
Jul 12 13:07:38 ip-172-31-62-245 sshd\[3286\]: Failed password for invalid user sp from 116.7.176.7 port 46966 ssh2\
Jul 12 13:11:53 ip-172-31-62-245 sshd\[3405\]: Invalid user firebird from 116.7.176.7\
2019-07-12 21:56:18
188.0.2.8 attack
Brute force attempt
2019-07-12 21:31:01
153.36.236.151 attackbotsspam
19/7/12@09:45:56: FAIL: IoT-SSH address from=153.36.236.151
...
2019-07-12 21:46:47
118.24.231.209 attackbotsspam
Jul 12 15:19:53 localhost sshd\[28403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.231.209  user=root
Jul 12 15:19:55 localhost sshd\[28403\]: Failed password for root from 118.24.231.209 port 49426 ssh2
Jul 12 15:27:09 localhost sshd\[29476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.231.209  user=root
2019-07-12 21:47:08
134.175.149.218 attackbotsspam
Jul 12 13:12:46 ip-172-31-1-72 sshd\[24029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.149.218  user=www-data
Jul 12 13:12:48 ip-172-31-1-72 sshd\[24029\]: Failed password for www-data from 134.175.149.218 port 42502 ssh2
Jul 12 13:19:15 ip-172-31-1-72 sshd\[24168\]: Invalid user magnifik from 134.175.149.218
Jul 12 13:19:15 ip-172-31-1-72 sshd\[24168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.149.218
Jul 12 13:19:18 ip-172-31-1-72 sshd\[24168\]: Failed password for invalid user magnifik from 134.175.149.218 port 43588 ssh2
2019-07-12 21:27:39
138.97.95.48 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-07-12 21:34:56
185.242.5.46 attackspambots
" "
2019-07-12 21:26:08
119.54.232.227 attackbots
5500/tcp
[2019-07-12]1pkt
2019-07-12 22:08:49
24.221.18.234 attack
Jul 12 11:41:31 ArkNodeAT sshd\[20144\]: Invalid user pi from 24.221.18.234
Jul 12 11:41:31 ArkNodeAT sshd\[20144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.221.18.234
Jul 12 11:41:31 ArkNodeAT sshd\[20146\]: Invalid user pi from 24.221.18.234
2019-07-12 21:42:34

Recently Reported IPs

99.109.209.236 221.223.165.69 48.222.5.33 191.94.225.108
180.80.10.16 57.13.180.71 4.141.22.150 147.96.144.97
128.189.22.112 55.58.147.213 25.23.5.202 138.96.136.224
249.53.255.4 63.67.6.251 192.237.151.68 192.10.227.142
157.80.74.192 8.169.233.32 237.7.252.238 120.167.189.201