Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 7.194.138.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;7.194.138.130.			IN	A

;; AUTHORITY SECTION:
.			240	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023031400 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 15 02:59:20 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 130.138.194.7.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.138.194.7.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
24.246.134.164 attackbots
Unauthorized connection attempt detected from IP address 24.246.134.164 to port 5555 [J]
2020-02-04 00:54:40
112.169.152.105 attackspambots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105 
Failed password for invalid user hadoop from 112.169.152.105 port 33204 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.152.105
2020-02-04 00:42:43
2.47.77.176 attackspambots
Unauthorized connection attempt detected from IP address 2.47.77.176 to port 22 [J]
2020-02-04 00:55:29
46.200.231.161 attackbots
Unauthorized connection attempt detected from IP address 46.200.231.161 to port 23 [J]
2020-02-04 00:50:47
177.84.40.252 attackspambots
Unauthorized connection attempt detected from IP address 177.84.40.252 to port 8080 [J]
2020-02-04 00:34:38
170.106.74.243 attackbotsspam
Unauthorized connection attempt detected from IP address 170.106.74.243 to port 3940 [J]
2020-02-04 00:35:22
101.89.95.77 attackspam
Unauthorized connection attempt detected from IP address 101.89.95.77 to port 2220 [J]
2020-02-04 00:45:00
61.154.196.178 attackbotsspam
Unauthorized connection attempt detected from IP address 61.154.196.178 to port 23 [J]
2020-02-04 00:49:53
118.70.91.44 attackspambots
Unauthorized connection attempt detected from IP address 118.70.91.44 to port 23 [J]
2020-02-04 00:41:22
217.73.133.94 attackbots
Unauthorized connection attempt detected from IP address 217.73.133.94 to port 5555 [J]
2020-02-04 00:58:29
180.127.0.233 attackspam
Unauthorized connection attempt detected from IP address 180.127.0.233 to port 3389 [J]
2020-02-04 00:33:22
14.29.195.135 attack
Unauthorized connection attempt detected from IP address 14.29.195.135 to port 2220 [J]
2020-02-04 00:55:04
202.38.153.233 attack
IP blocked
2020-02-04 00:29:19
187.11.140.214 attackspambots
Unauthorized connection attempt detected from IP address 187.11.140.214 to port 1433 [J]
2020-02-04 01:02:19
190.48.82.244 attackbotsspam
Unauthorized connection attempt detected from IP address 190.48.82.244 to port 23 [J]
2020-02-04 01:00:48

Recently Reported IPs

40.77.2.164 171.8.172.228 212.25.249.133 162.215.217.8
93.183.15.8 219.100.37.64 88.236.183.101 111.137.236.4
31.10.134.2 73.12.102.229 82.107.60.147 31.184.238.123
113.24.225.99 247.94.138.8 238.237.26.95 85.90.151.65
3.12.191.67 89.55.92.104 146.232.142.166 85.164.121.90