Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.30.245.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.30.245.164.			IN	A

;; AUTHORITY SECTION:
.			159	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092401 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 25 07:07:22 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 164.245.30.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.245.30.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.29.105.12 attackbots
Invalid user dropbox from 200.29.105.12 port 50693
2020-10-02 23:27:14
5.9.155.226 attack
20 attempts against mh-misbehave-ban on flare
2020-10-02 23:43:00
157.230.42.76 attack
Oct  2 20:18:34 gw1 sshd[12040]: Failed password for root from 157.230.42.76 port 45207 ssh2
...
2020-10-02 23:35:07
49.233.185.157 attack
Oct  2 13:59:00 inter-technics sshd[12283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.157  user=root
Oct  2 13:59:02 inter-technics sshd[12283]: Failed password for root from 49.233.185.157 port 43374 ssh2
Oct  2 14:03:10 inter-technics sshd[12529]: Invalid user glenn from 49.233.185.157 port 60128
Oct  2 14:03:10 inter-technics sshd[12529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.157
Oct  2 14:03:10 inter-technics sshd[12529]: Invalid user glenn from 49.233.185.157 port 60128
Oct  2 14:03:12 inter-technics sshd[12529]: Failed password for invalid user glenn from 49.233.185.157 port 60128 ssh2
...
2020-10-02 23:24:26
122.51.64.115 attack
SSH login attempts.
2020-10-02 23:44:03
41.200.247.222 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 23:33:42
35.242.214.242 attackspambots
[02/Oct/2020:15:40:20 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-02 23:20:45
213.158.29.179 attack
Oct  2 16:11:57 * sshd[28177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.158.29.179
Oct  2 16:11:59 * sshd[28177]: Failed password for invalid user test from 213.158.29.179 port 51016 ssh2
2020-10-02 23:28:09
40.113.85.192 attackbots
02.10.2020 02:15:22 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-10-02 23:14:34
52.172.153.7 attack
(PERMBLOCK) 52.172.153.7 (IN/India/-) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-10-02 23:46:42
185.136.52.158 attack
Time:     Fri Oct  2 15:25:56 2020 +0200
IP:       185.136.52.158 (PT/Portugal/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Oct  2 15:04:30 3-1 sshd[64496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.136.52.158  user=ftpuser
Oct  2 15:04:31 3-1 sshd[64496]: Failed password for ftpuser from 185.136.52.158 port 53022 ssh2
Oct  2 15:19:10 3-1 sshd[64981]: Invalid user admin from 185.136.52.158 port 50328
Oct  2 15:19:12 3-1 sshd[64981]: Failed password for invalid user admin from 185.136.52.158 port 50328 ssh2
Oct  2 15:25:53 3-1 sshd[65260]: Invalid user whois from 185.136.52.158 port 58278
2020-10-02 23:48:53
124.207.98.213 attack
$f2bV_matches
2020-10-02 23:20:26
111.231.223.216 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 23:29:25
213.113.9.166 attackbotsspam
Oct  2 10:04:56 vps639187 sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.113.9.166  user=root
Oct  2 10:04:58 vps639187 sshd\[4277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.113.9.166  user=root
Oct  2 10:04:59 vps639187 sshd\[4273\]: Failed password for root from 213.113.9.166 port 52714 ssh2
...
2020-10-02 23:39:03
218.241.134.34 attack
2020-10-02T21:49:38.099416hostname sshd[1321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34
2020-10-02T21:49:38.082724hostname sshd[1321]: Invalid user apple from 218.241.134.34 port 57651
2020-10-02T21:49:40.127609hostname sshd[1321]: Failed password for invalid user apple from 218.241.134.34 port 57651 ssh2
...
2020-10-02 23:30:08

Recently Reported IPs

1.3.27.120 1.30.214.72 1.30.29.48 1.31.85.159
1.30.205.124 1.30.206.36 1.30.19.135 1.30.87.186
1.3.231.147 1.29.63.188 1.30.189.152 1.3.254.51
1.30.3.4 1.30.122.21 1.30.231.30 1.30.159.168
1.3.19.79 1.3.205.136 1.30.190.101 1.3.239.91