Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.48.85.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.48.85.30.			IN	A

;; AUTHORITY SECTION:
.			423	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 27 01:25:58 CST 2021
;; MSG SIZE  rcvd: 105
Host info
b'Host 30.85.48.111.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 111.48.85.30.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
187.38.26.225 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-27 08:00:10
45.143.220.14 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-27 07:55:13
148.251.20.130 attack
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 08:09:37
61.227.41.253 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 57 - port: 23 proto: TCP cat: Misc Attack
2019-10-27 07:52:58
61.219.11.153 attackbotsspam
port scan and connect, tcp 80 (http)
2019-10-27 07:53:14
81.22.45.229 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 40047 proto: TCP cat: Misc Attack
2019-10-27 08:15:52
80.82.77.227 attackbotsspam
Brute force attack stopped by firewall
2019-10-27 07:49:42
185.209.0.89 attack
10/27/2019-01:11:46.084669 185.209.0.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:01:02
59.50.85.195 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:54:01
148.251.20.143 attackbotsspam
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 08:08:13
63.141.232.197 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:52:31
207.46.13.69 attackspambots
Automatic report - Banned IP Access
2019-10-27 08:24:55
185.156.73.45 attackspam
Multiport scan : 25 ports scanned 1219 1220 1221 8134 9814 9815 9816 35434 35435 35436 36892 36893 36894 57769 57770 57771 59440 59441 59442 60841 60842 60843 63697 63698 63699
2019-10-27 08:02:16
185.156.73.11 attackbots
Multiport scan : 27 ports scanned 3253 3254 3255 3880 3881 3882 21802 21803 21804 25318 25319 25320 41884 41885 41886 42811 42812 42813 44377 44378 44379 57112 57113 57114 58000 58001 58002
2019-10-27 08:04:00
81.22.45.15 attackspambots
Port scan: Attack repeated for 24 hours
2019-10-27 07:49:28

Recently Reported IPs

66.1.161.123 187.119.96.38 61.122.102.18 106.89.26.109
135.226.188.87 165.249.57.199 129.244.103.54 91.172.169.81
93.98.223.184 165.16.21.215 165.16.119.136 11.236.20.18
84.107.76.188 244.138.57.13 103.141.76.4 33.238.210.122
44.202.199.105 175.13.210.205 196.76.128.139 99.28.92.52