Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: Sevastre Cosmin Mihai Persoana Fizica Autorizata

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.130.242.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54839
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.130.242.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061702 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 18 18:12:54 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 14.242.130.31.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 14.242.130.31.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.51.174.110 attack
Invalid user admin from 197.51.174.110 port 48388
2020-04-21 02:50:37
123.206.62.112 attackbotsspam
Apr 20 15:04:23 jane sshd[7600]: Failed password for root from 123.206.62.112 port 40975 ssh2
Apr 20 15:08:30 jane sshd[13640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.62.112 
...
2020-04-21 03:21:11
149.56.26.16 attack
Apr 20 18:22:20 host5 sshd[7577]: Invalid user jo from 149.56.26.16 port 38248
...
2020-04-21 03:12:15
165.22.103.237 attackspambots
(sshd) Failed SSH login from 165.22.103.237 (SG/Singapore/-): 5 in the last 3600 secs
2020-04-21 03:08:19
113.172.125.41 attack
Invalid user admin from 113.172.125.41 port 44111
2020-04-21 03:27:30
181.15.243.250 attackspam
Invalid user amd from 181.15.243.250 port 25352
2020-04-21 03:01:57
113.21.121.117 attack
Invalid user admin from 113.21.121.117 port 58668
2020-04-21 03:28:05
184.82.205.16 attackbots
Invalid user admin from 184.82.205.16 port 46206
2020-04-21 02:59:12
113.125.13.14 attackspambots
Apr 21 02:06:55 f sshd\[23571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.13.14  user=root
Apr 21 02:06:57 f sshd\[23571\]: Failed password for root from 113.125.13.14 port 52580 ssh2
Apr 21 02:18:40 f sshd\[23771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.13.14  user=root
...
2020-04-21 03:27:44
192.228.100.222 attackbotsspam
Invalid user DUP from 192.228.100.222 port 46190
2020-04-21 02:53:05
111.10.24.147 attackspambots
Invalid user test from 111.10.24.147 port 14982
2020-04-21 03:29:21
182.74.25.246 attackspambots
Apr 20 13:38:44 mout sshd[4410]: Invalid user aj from 182.74.25.246 port 18195
Apr 20 13:38:46 mout sshd[4410]: Failed password for invalid user aj from 182.74.25.246 port 18195 ssh2
Apr 20 20:22:03 mout sshd[31159]: Invalid user ubuntu from 182.74.25.246 port 25581
2020-04-21 03:01:01
111.59.100.243 attackspambots
prod3
...
2020-04-21 03:28:56
193.70.36.161 attack
odoo8
...
2020-04-21 02:52:04
129.28.196.215 attack
Apr 20 09:43:20 lanister sshd[10611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.196.215
Apr 20 09:43:20 lanister sshd[10611]: Invalid user admin from 129.28.196.215
Apr 20 09:43:22 lanister sshd[10611]: Failed password for invalid user admin from 129.28.196.215 port 32874 ssh2
Apr 20 09:53:05 lanister sshd[10783]: Invalid user gw from 129.28.196.215
2020-04-21 03:20:50

Recently Reported IPs

77.40.3.194 79.121.171.224 133.201.61.62 98.129.175.244
49.135.117.93 118.141.229.44 1.144.201.55 27.111.46.156
17.205.54.67 5.58.78.214 146.154.18.123 103.103.124.233
174.108.239.188 207.130.153.11 80.231.84.231 17.187.196.243
139.59.95.240 149.104.127.114 188.50.77.39 180.153.214.4