Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.137.30.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.137.30.253.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:13:30 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 253.30.137.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.30.137.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.129.42.115 attackbotsspam
suspicious action Fri, 06 Mar 2020 10:27:14 -0300
2020-03-07 05:08:17
14.63.160.179 attackspambots
Mar  6 12:01:01 lanister sshd[24505]: Failed password for invalid user himanshu from 14.63.160.179 port 36812 ssh2
Mar  6 12:10:12 lanister sshd[24665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.160.179  user=root
Mar  6 12:10:14 lanister sshd[24665]: Failed password for root from 14.63.160.179 port 56384 ssh2
Mar  6 12:17:20 lanister sshd[24735]: Invalid user tsbot from 14.63.160.179
2020-03-07 04:57:27
211.75.76.138 attackbotsspam
firewall-block, port(s): 445/tcp
2020-03-07 04:45:41
123.206.230.174 attackspam
[05/Mar/2020:21:51:29 -0500] - [05/Mar/2020:21:57:12 -0500] Php probe script
2020-03-07 05:11:25
192.241.213.10 attackbotsspam
Unauthorized SSH login attempts
2020-03-07 05:15:33
92.240.207.149 attackbotsspam
Chat Spam
2020-03-07 04:44:36
192.99.245.135 attack
Mar  6 22:25:26 server sshd\[21622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.ip-192-99-245.net  user=root
Mar  6 22:25:28 server sshd\[21622\]: Failed password for root from 192.99.245.135 port 38774 ssh2
Mar  6 22:45:02 server sshd\[24987\]: Invalid user nmrsu from 192.99.245.135
Mar  6 22:45:02 server sshd\[24987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.ip-192-99-245.net 
Mar  6 22:45:04 server sshd\[24987\]: Failed password for invalid user nmrsu from 192.99.245.135 port 43470 ssh2
...
2020-03-07 04:42:29
192.241.222.84 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-07 05:17:23
62.28.135.104 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-07 04:53:58
168.90.91.171 attackbots
Port probing on unauthorized port 445
2020-03-07 04:53:40
178.171.45.191 attack
Chat Spam
2020-03-07 05:14:14
70.126.65.13 attack
Honeypot attack, port: 5555, PTR: 70-126-65-13.res.bhn.net.
2020-03-07 05:00:17
139.59.76.99 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/139.59.76.99/ 
 
 NL - 1H : (36)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN14061 
 
 IP : 139.59.76.99 
 
 CIDR : 139.59.64.0/20 
 
 PREFIX COUNT : 490 
 
 UNIQUE IP COUNT : 1963008 
 
 
 ATTACKS DETECTED ASN14061 :  
  1H - 4 
  3H - 8 
  6H - 8 
 12H - 8 
 24H - 18 
 
 DateTime : 2020-03-06 14:46:25 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2020-03-07 04:46:26
211.83.98.199 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-03-07 04:56:38
177.98.102.235 attackspam
Honeypot attack, port: 445, PTR: 177.98.102.dynamic.adsl.gvt.net.br.
2020-03-07 05:24:31

Recently Reported IPs

112.138.122.198 112.137.80.223 112.137.44.124 112.138.155.92
112.137.50.232 112.138.195.240 112.137.65.224 112.137.239.140
112.137.234.83 112.137.52.41 112.137.40.181 112.137.227.233
112.137.66.74 112.137.45.112 112.137.194.201 112.137.228.3
112.137.231.98 112.137.240.181 112.137.220.95 112.137.206.75