IP: 104.130.19.164 United States Location: United States
Country:
United States
Latitude:
37.751
Longitude:
-97.822
NetRange: 104.130.0.0 - 104.130.255.255
CIDR: 104.130.0.0/16
NetName: RACKS-8-NET-16
NetHandle: NET-104-130-0-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS19994
Organization: Rackspace Hosting (RACKS-8)
RegDate: 2014-05-19
Updated: 2014-05-19
Ref: https://rdap.arin.net/registry/ip/104.130.0.0

OrgName: Rackspace Hosting
OrgId: RACKS-8
Address: 1 Fanatical Place
City: Windcrest
StateProv: TX
PostalCode: 78218
Country: US
RegDate: 2010-03-29
Updated: 2017-09-12
Ref: https://rdap.arin.net/registry/entity/RACKS-8

OrgNOCHandle: HANSE157-ARIN
OrgNOCName: Hansell, Chris
OrgNOCPhone: +1-210-312-4000
OrgNOCEmail: hostmaster@rackspace.com
OrgNOCRef: https://rdap.arin.net/registry/entity/HANSE157-ARIN

OrgTechHandle: IPADM17-ARIN
OrgTechName: IPADMIN
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADM17-ARIN

OrgAbuseHandle: ABUSE45-ARIN
OrgAbuseName: Abuse Desk
OrgAbusePhone: +1-210-312-4000
OrgAbuseEmail: abuse@rackspace.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE45-ARIN

OrgTechHandle: HANSE157-ARIN
OrgTechName: Hansell, Chris
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/HANSE157-ARIN

OrgTechHandle: ZR9-ARIN
OrgTechName: Rackspace, com
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZR9-ARIN

NetRange: 104.130.0.0 - 104.130.31.255
CIDR: 104.130.0.0/19
NetName: RACKS-8-1401211335088799
NetHandle: NET-104-130-0-0-2
Parent: RACKS-8-NET-16 (NET-104-130-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Cloud Servers Cell 0001-0003 IAD3 (C05064157)
RegDate: 2014-05-29
Updated: 2014-05-29
Ref: https://rdap.arin.net/registry/ip/104.130.0.0

CustName: Cloud Servers Cell 0001-0003 IAD3
Address: 5000 Walzem Rd.
City: San Antonio
StateProv: TX
PostalCode: 78218
Country: US
RegDate: 2014-05-27
Updated: 2014-05-27
Ref: https://rdap.arin.net/registry/entity/C05064157

OrgNOCHandle: HANSE157-ARIN
OrgNOCName: Hansell, Chris
OrgNOCPhone: +1-210-312-4000
OrgNOCEmail: hostmaster@rackspace.com
OrgNOCRef: https://rdap.arin.net/registry/entity/HANSE157-ARIN

OrgTechHandle: IPADM17-ARIN
OrgTechName: IPADMIN
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPADM17-ARIN

OrgAbuseHandle: ABUSE45-ARIN
OrgAbuseName: Abuse Desk
OrgAbusePhone: +1-210-312-4000
OrgAbuseEmail: abuse@rackspace.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE45-ARIN

OrgTechHandle: HANSE157-ARIN
OrgTechName: Hansell, Chris
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/HANSE157-ARIN

OrgTechHandle: ZR9-ARIN
OrgTechName: Rackspace, com
OrgTechPhone: +1-210-312-4000
OrgTechEmail: hostmaster@rackspace.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZR9-ARIN
DNS BlackList results:
Most recent complaints on 104.130.19.164
Complaint by Tuan Vu :

A machine from this IP address, 104.130.19.164, had tried hacking to our network on VPN port 500.

Reported on: 22nd, Oct. 2015
Complaint by Tuan Vu :

Network attack again

Reported on: 6th, Nov. 2015
Complaint by Glenn :

Same here. they are trying the VPN port.

Reported on: 25th, Nov. 2015
Complaint by John Martoccio :

104.130.19.164 has been initiating Smurf Attack on our firewall. ICMP 11/25@ 7:44 and 15:14 GMT

Reported on: 26th, Nov. 2015
Complaint by Deren :

A machine from this IP address, 104.130.19.164, had tried hacking to our network on VPN port 500.

Reported on: 4th, Dec. 2015
Complaint by Tim :

Same here. Attack VPN port 500. Angry!

Reported on: 24th, Dec. 2015
Complaint by Lars :

Same hack via SSL

Reported on: 14th, Feb. 2016
Complaint by Mochino :

This IP is not trying to hack into any network. It is simply trying to survey the internet for VPNs and Proxies.

Reported on: 26th, Mar. 2016
Complaint by Mirek :

A machine from this IP address, 104.130.19.164, had tried hacking to our network on VPN port 500.

Reported on: 27th, Mar. 2016
Complaint by ivozana :

try hack ipsec ?

Reported on: 6th, Apr. 2016
Complaint by JWW :

Trying to hack ipsec

Reported on: 1st, May. 2016
Complaint by Forensicron :

Trying to hack our VPN 2016-06-26

Reported on: 26th, Jun. 2016
Complaint by thomasverschoren :

Tried to access all our VPn tunnels

Reported on: 6th, Jul. 2016
Complaint by Anonymous :

This keepings hacking

Reported on: 16th, Dec. 2016

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 104.130.19.164 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.