Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.8.130.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.8.130.104.			IN	A

;; AUTHORITY SECTION:
.			304	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024040402 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 05 11:58:29 CST 2024
;; MSG SIZE  rcvd: 104
Host info
104.130.8.3.in-addr.arpa domain name pointer ec2-3-8-130-104.eu-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.130.8.3.in-addr.arpa	name = ec2-3-8-130-104.eu-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.97.131.50 attack
20/1/7@23:46:06: FAIL: Alarm-Network address from=118.97.131.50
...
2020-01-08 19:57:45
101.255.115.76 attack
445/tcp 445/tcp
[2020-01-08]2pkt
2020-01-08 19:48:01
200.217.57.203 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-08 20:01:06
177.8.172.218 attackbotsspam
Unauthorized connection attempt from IP address 177.8.172.218 on Port 445(SMB)
2020-01-08 19:58:13
140.246.32.143 attackspam
Jan  7 19:32:11 eddieflores sshd\[30754\]: Invalid user user10 from 140.246.32.143
Jan  7 19:32:11 eddieflores sshd\[30754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.32.143
Jan  7 19:32:12 eddieflores sshd\[30754\]: Failed password for invalid user user10 from 140.246.32.143 port 57126 ssh2
Jan  7 19:33:24 eddieflores sshd\[30859\]: Invalid user fuck from 140.246.32.143
Jan  7 19:33:24 eddieflores sshd\[30859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.32.143
2020-01-08 19:37:57
1.52.123.77 attackbotsspam
Unauthorized connection attempt from IP address 1.52.123.77 on Port 445(SMB)
2020-01-08 19:47:18
159.203.201.91 attackspam
01/07/2020-23:46:08.963690 159.203.201.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-08 19:56:11
101.51.138.43 attackbots
unauthorized connection attempt
2020-01-08 20:01:37
24.232.123.133 attackspambots
$f2bV_matches
2020-01-08 19:29:06
111.254.37.148 attackspam
1578458756 - 01/08/2020 05:45:56 Host: 111.254.37.148/111.254.37.148 Port: 445 TCP Blocked
2020-01-08 20:06:57
145.239.83.89 attack
Unauthorized connection attempt detected from IP address 145.239.83.89 to port 2220 [J]
2020-01-08 20:02:39
171.232.2.107 attackbotsspam
1578461238 - 01/08/2020 06:27:18 Host: 171.232.2.107/171.232.2.107 Port: 445 TCP Blocked
2020-01-08 20:04:53
119.152.4.34 attack
Unauthorized connection attempt from IP address 119.152.4.34 on Port 445(SMB)
2020-01-08 19:49:04
125.25.248.209 attackbots
Unauthorized connection attempt from IP address 125.25.248.209 on Port 445(SMB)
2020-01-08 20:08:25
203.194.110.53 attack
Unauthorized connection attempt from IP address 203.194.110.53 on Port 445(SMB)
2020-01-08 19:55:27

Recently Reported IPs

3.8.124.240 3.8.134.179 3.8.127.150 3.8.127.98
3.8.127.32 3.8.134.47 3.8.134.104 3.8.133.113
3.8.132.111 3.8.131.46 2.57.17.124 2.57.17.167
2.57.17.161 2.57.17.182 2.57.17.103 2.57.78.84
2.57.78.148 2.57.79.190 3.0.211.18 3.1.72.182