Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.214.30.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.214.30.244.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 08 04:20:33 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 244.30.214.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.30.214.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.70.100.33 attackbotsspam
Contact form spam. -sta
2020-03-11 10:04:55
36.229.97.147 attack
Unauthorized connection attempt from IP address 36.229.97.147 on Port 445(SMB)
2020-03-11 10:22:57
218.23.104.250 attackspam
suspicious action Tue, 10 Mar 2020 15:08:27 -0300
2020-03-11 09:59:00
185.195.27.206 attackspam
Mar 11 02:22:02 vps sshd[8515]: Failed password for root from 185.195.27.206 port 33152 ssh2
Mar 11 02:47:46 vps sshd[9870]: Failed password for root from 185.195.27.206 port 36222 ssh2
Mar 11 02:53:32 vps sshd[10182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.195.27.206 
...
2020-03-11 09:59:29
51.75.19.175 attackbotsspam
Invalid user test from 51.75.19.175 port 39126
2020-03-11 10:11:08
180.250.242.225 attack
CMS (WordPress or Joomla) login attempt.
2020-03-11 10:36:23
139.99.105.138 attackbots
Mar 11 03:11:04 [snip] sshd[3878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.105.138  user=root
Mar 11 03:11:05 [snip] sshd[3878]: Failed password for root from 139.99.105.138 port 46950 ssh2
Mar 11 03:16:04 [snip] sshd[4482]: Invalid user user from 139.99.105.138 port 35164[...]
2020-03-11 10:38:29
109.94.223.78 attackbots
B: Magento admin pass test (wrong country)
2020-03-11 10:05:26
87.67.46.82 attackspambots
suspicious action Tue, 10 Mar 2020 15:08:13 -0300
2020-03-11 10:11:50
46.101.19.133 attackspam
2020-03-11T01:16:21.815531vps773228.ovh.net sshd[12263]: Invalid user patrycja from 46.101.19.133 port 54237
2020-03-11T01:16:21.834151vps773228.ovh.net sshd[12263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133
2020-03-11T01:16:21.815531vps773228.ovh.net sshd[12263]: Invalid user patrycja from 46.101.19.133 port 54237
2020-03-11T01:16:23.883736vps773228.ovh.net sshd[12263]: Failed password for invalid user patrycja from 46.101.19.133 port 54237 ssh2
2020-03-11T01:24:40.455393vps773228.ovh.net sshd[12392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-03-11T01:24:42.675890vps773228.ovh.net sshd[12392]: Failed password for root from 46.101.19.133 port 33673 ssh2
2020-03-11T01:32:53.551117vps773228.ovh.net sshd[12460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.19.133  user=root
2020-03-11T01:32:55.450487vps773
...
2020-03-11 10:01:17
120.70.103.27 attack
Mar 10 23:06:09 ws24vmsma01 sshd[148705]: Failed password for root from 120.70.103.27 port 57642 ssh2
...
2020-03-11 10:29:42
66.181.167.115 attackbotsspam
Mar 10 19:04:23 vpn01 sshd[29200]: Failed password for root from 66.181.167.115 port 57118 ssh2
...
2020-03-11 10:13:33
36.79.254.206 attack
SMB Server BruteForce Attack
2020-03-11 10:14:32
165.22.60.7 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-03-11 10:00:53
51.75.17.6 attack
Mar 10 22:59:38 vmd17057 sshd[613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.17.6 
Mar 10 22:59:40 vmd17057 sshd[613]: Failed password for invalid user dsvmadmin from 51.75.17.6 port 51350 ssh2
...
2020-03-11 09:58:30

Recently Reported IPs

112.214.138.125 112.214.139.241 112.214.134.98 112.214.125.134
112.214.31.252 112.214.254.105 112.215.159.220 112.214.25.135
112.214.166.208 112.214.13.7 112.214.108.169 112.214.101.251
112.214.116.1 112.214.100.213 112.214.163.227 112.214.107.222
112.213.98.163 112.214.114.252 112.214.115.96 112.215.130.108