Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Luohe

Region: Henan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.199.30.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.199.30.14.			IN	A

;; AUTHORITY SECTION:
.			391	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 08:36:09 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 14.30.199.1.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 1.199.30.14.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.218.156.38 attack
Nov 26 07:16:07 mxgate1 postfix/postscreen[19964]: CONNECT from [89.218.156.38]:53322 to [176.31.12.44]:25
Nov 26 07:16:07 mxgate1 postfix/dnsblog[19965]: addr 89.218.156.38 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 26 07:16:07 mxgate1 postfix/dnsblog[19967]: addr 89.218.156.38 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 26 07:16:07 mxgate1 postfix/dnsblog[19969]: addr 89.218.156.38 listed by domain bl.spamcop.net as 127.0.0.2
Nov 26 07:16:07 mxgate1 postfix/dnsblog[19968]: addr 89.218.156.38 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 26 07:16:07 mxgate1 postfix/dnsblog[20242]: addr 89.218.156.38 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 26 07:16:07 mxgate1 postfix/postscreen[19964]: PREGREET 22 after 0.12 from [89.218.156.38]:53322: EHLO [89.218.156.38]

Nov 26 07:16:07 mxgate1 postfix/postscreen[19964]: DNSBL rank 6 for [89.218.156.38]:53322
Nov x@x
Nov 26 07:16:08 mxgate1 postfix/postscreen[19964]: HANGUP after 0.41 from [89.2........
-------------------------------
2019-11-26 17:30:27
140.210.9.10 attackbots
Nov 25 01:21:14 rama sshd[123353]: Invalid user ruby2 from 140.210.9.10
Nov 25 01:21:14 rama sshd[123353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.10 
Nov 25 01:21:17 rama sshd[123353]: Failed password for invalid user ruby2 from 140.210.9.10 port 50954 ssh2
Nov 25 01:21:17 rama sshd[123353]: Received disconnect from 140.210.9.10: 11: Bye Bye [preauth]
Nov 25 01:33:07 rama sshd[126359]: Invalid user squid from 140.210.9.10
Nov 25 01:33:07 rama sshd[126359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.10 
Nov 25 01:33:09 rama sshd[126359]: Failed password for invalid user squid from 140.210.9.10 port 48686 ssh2
Nov 25 01:33:09 rama sshd[126359]: Received disconnect from 140.210.9.10: 11: Bye Bye [preauth]
Nov 25 01:37:09 rama sshd[127547]: Invalid user eckhart from 140.210.9.10
Nov 25 01:37:09 rama sshd[127547]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2019-11-26 17:47:58
82.99.40.237 attack
Lines containing failures of 82.99.40.237
Nov 26 06:01:21 zabbix sshd[61470]: Invalid user jxd786 from 82.99.40.237 port 38994
Nov 26 06:01:21 zabbix sshd[61470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237
Nov 26 06:01:23 zabbix sshd[61470]: Failed password for invalid user jxd786 from 82.99.40.237 port 38994 ssh2
Nov 26 06:01:23 zabbix sshd[61470]: Received disconnect from 82.99.40.237 port 38994:11: Bye Bye [preauth]
Nov 26 06:01:23 zabbix sshd[61470]: Disconnected from invalid user jxd786 82.99.40.237 port 38994 [preauth]
Nov 26 06:32:14 zabbix sshd[62931]: Invalid user nevja from 82.99.40.237 port 51752
Nov 26 06:32:14 zabbix sshd[62931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237
Nov 26 06:32:16 zabbix sshd[62931]: Failed password for invalid user nevja from 82.99.40.237 port 51752 ssh2
Nov 26 06:32:16 zabbix sshd[62931]: Received disconnect from 82.99........
------------------------------
2019-11-26 17:36:38
91.222.88.102 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:51.
2019-11-26 17:51:53
175.211.105.99 attackbots
$f2bV_matches
2019-11-26 17:57:34
222.186.175.161 attack
2019-11-26T09:38:15.736471abusebot-7.cloudsearch.cf sshd\[21462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
2019-11-26 17:45:50
106.75.15.142 attackbotsspam
Nov 26 10:26:19 legacy sshd[15014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.15.142
Nov 26 10:26:21 legacy sshd[15014]: Failed password for invalid user moua from 106.75.15.142 port 40496 ssh2
Nov 26 10:34:05 legacy sshd[15115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.15.142
...
2019-11-26 18:02:02
123.30.236.149 attack
Nov 26 10:21:12 MK-Soft-VM7 sshd[18787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149 
Nov 26 10:21:14 MK-Soft-VM7 sshd[18787]: Failed password for invalid user maciazek from 123.30.236.149 port 16016 ssh2
...
2019-11-26 18:01:43
95.172.60.138 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:52.
2019-11-26 17:50:19
222.252.118.216 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:43.
2019-11-26 18:04:47
5.248.35.212 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:50.
2019-11-26 17:53:27
203.115.104.60 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:43.
2019-11-26 18:06:43
31.23.120.224 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:44.
2019-11-26 18:05:53
42.114.191.11 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:46.
2019-11-26 17:59:55
49.145.226.215 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 26-11-2019 06:25:48.
2019-11-26 17:56:36

Recently Reported IPs

1.199.30.138 1.199.30.140 153.124.92.152 1.199.31.70
1.199.31.72 1.199.31.74 1.199.31.77 1.199.31.78
1.199.31.80 29.220.214.255 1.199.31.82 1.199.31.84
1.199.31.86 1.199.31.89 1.199.31.9 1.199.31.90
1.2.134.161 83.207.223.58 1.2.134.176 1.2.134.184