Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.219.130.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.219.130.8.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 23:23:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 8.130.219.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.130.219.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.195.156 attackspam
" "
2020-09-28 06:40:01
183.234.131.100 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=52281  .  dstport=23  .     (2669)
2020-09-28 06:55:07
52.156.64.31 attackspambots
SSH Invalid Login
2020-09-28 06:49:59
222.186.180.8 attackbots
Sep 28 00:32:06 vpn01 sshd[25569]: Failed password for root from 222.186.180.8 port 20622 ssh2
Sep 28 00:32:18 vpn01 sshd[25569]: Failed password for root from 222.186.180.8 port 20622 ssh2
Sep 28 00:32:18 vpn01 sshd[25569]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 20622 ssh2 [preauth]
...
2020-09-28 06:33:40
185.132.53.5 attackbots
$f2bV_matches
2020-09-28 06:43:36
49.76.211.178 attackspambots
135/tcp 1433/tcp
[2020-09-26]2pkt
2020-09-28 06:47:04
70.24.111.151 attack
5555/tcp
[2020-09-26]1pkt
2020-09-28 06:37:02
189.240.62.227 attackbots
Invalid user apple from 189.240.62.227 port 44384
2020-09-28 06:44:51
49.88.112.72 attack
Sep 28 01:29:34 pkdns2 sshd\[51493\]: Failed password for root from 49.88.112.72 port 25299 ssh2Sep 28 01:29:35 pkdns2 sshd\[51493\]: Failed password for root from 49.88.112.72 port 25299 ssh2Sep 28 01:29:38 pkdns2 sshd\[51493\]: Failed password for root from 49.88.112.72 port 25299 ssh2Sep 28 01:30:27 pkdns2 sshd\[51569\]: Failed password for root from 49.88.112.72 port 21923 ssh2Sep 28 01:31:20 pkdns2 sshd\[51606\]: Failed password for root from 49.88.112.72 port 16045 ssh2Sep 28 01:32:12 pkdns2 sshd\[51644\]: Failed password for root from 49.88.112.72 port 10697 ssh2
...
2020-09-28 06:48:32
52.142.195.37 attackspambots
Invalid user admin from 52.142.195.37 port 40584
2020-09-28 06:57:54
61.135.152.133 attackbots
Port probing on unauthorized port 1433
2020-09-28 06:46:51
200.52.80.34 attack
Sep 27 22:41:26 ajax sshd[26402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.52.80.34 
Sep 27 22:41:29 ajax sshd[26402]: Failed password for invalid user student8 from 200.52.80.34 port 39824 ssh2
2020-09-28 07:05:03
182.61.150.12 attackspam
SSH Bruteforce attack
2020-09-28 06:59:12
13.68.147.197 attack
Invalid user 253 from 13.68.147.197 port 10522
2020-09-28 06:33:09
61.135.152.130 attackbotsspam
Port probing on unauthorized port 1433
2020-09-28 06:54:01

Recently Reported IPs

226.185.188.126 244.213.185.198 191.41.243.188 22.201.14.152
144.252.75.158 115.143.221.240 70.245.230.248 76.48.97.57
127.152.42.41 30.114.144.183 253.252.157.227 192.233.165.47
96.94.240.129 106.86.29.230 144.241.114.103 60.84.91.16
117.68.157.111 22.32.68.106 85.86.163.227 249.36.4.146