Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.122.1.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.122.1.130.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030202 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 14:56:53 CST 2020
;; MSG SIZE  rcvd: 117
Host info
130.1.122.219.in-addr.arpa is an alias for 130.0-24.1.122.219.in-addr.arpa.
130.0-24.1.122.219.in-addr.arpa domain name pointer newip130.telewave.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.1.122.219.in-addr.arpa	canonical name = 130.0-24.1.122.219.in-addr.arpa.
130.0-24.1.122.219.in-addr.arpa	name = newip130.telewave.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
65.75.105.76 attackbots
Port Scan: TCP/445
2019-09-20 21:01:13
76.76.239.123 attack
Port Scan: UDP/137
2019-09-20 21:31:03
211.250.204.209 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/211.250.204.209/ 
 KR - 1H : (71)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 211.250.204.209 
 
 CIDR : 211.250.192.0/19 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 WYKRYTE ATAKI Z ASN4766 :  
  1H - 2 
  3H - 6 
  6H - 10 
 12H - 12 
 24H - 34 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-20 21:38:43
123.9.33.249 attackbots
Port Scan: TCP/23
2019-09-20 21:23:18
222.133.178.242 attackbotsspam
Port Scan: UDP/34567
2019-09-20 21:10:33
61.228.180.152 attackspambots
Port Scan: TCP/23
2019-09-20 21:04:06
74.208.43.245 attackbots
Port Scan: TCP/445
2019-09-20 21:31:41
42.5.210.161 attack
Port Scan: TCP/23
2019-09-20 21:35:30
191.17.175.229 attackspam
Port Scan: TCP/8080
2019-09-20 21:16:35
12.111.35.138 attackspambots
Port Scan: UDP/137
2019-09-20 21:09:33
82.112.185.189 attack
Port Scan: TCP/88
2019-09-20 21:30:46
166.167.216.143 attackspam
Port Scan: UDP/30
2019-09-20 21:21:45
50.63.167.15 attack
Port Scan: TCP/445
2019-09-20 21:05:18
63.142.57.106 attackbotsspam
Port Scan: UDP/137
2019-09-20 21:02:59
82.112.162.105 attack
Port Scan: TCP/81
2019-09-20 20:57:09

Recently Reported IPs

201.141.231.106 223.204.249.53 32.207.95.102 190.121.75.145
47.72.90.36 170.5.49.91 14.49.36.132 21.202.170.92
187.132.231.248 14.215.153.68 98.137.228.183 118.232.14.124
174.253.82.122 43.227.128.24 14.190.180.155 43.227.128.25
186.251.85.23 125.43.73.89 2.85.245.90 89.120.5.20