Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.253.20.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.253.20.30.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 05:49:58 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 30.20.253.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.20.253.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.102.6 attack
Aug  2 23:02:25 vpn01 sshd\[26515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.6  user=root
Aug  2 23:02:27 vpn01 sshd\[26515\]: Failed password for root from 185.220.102.6 port 40805 ssh2
Aug  2 23:02:29 vpn01 sshd\[26515\]: Failed password for root from 185.220.102.6 port 40805 ssh2
2019-08-03 08:02:22
78.130.128.106 attackbotsspam
Aug  2 21:24:32 minden010 sshd[20448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.130.128.106
Aug  2 21:24:33 minden010 sshd[20448]: Failed password for invalid user pi from 78.130.128.106 port 42410 ssh2
Aug  2 21:24:36 minden010 sshd[20479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.130.128.106
...
2019-08-03 07:54:02
49.232.50.122 attackbots
Aug  2 21:06:54 Ubuntu-1404-trusty-64-minimal sshd\[2323\]: Invalid user davidc from 49.232.50.122
Aug  2 21:06:54 Ubuntu-1404-trusty-64-minimal sshd\[2323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.50.122
Aug  2 21:06:56 Ubuntu-1404-trusty-64-minimal sshd\[2323\]: Failed password for invalid user davidc from 49.232.50.122 port 44632 ssh2
Aug  2 21:24:24 Ubuntu-1404-trusty-64-minimal sshd\[12322\]: Invalid user tally from 49.232.50.122
Aug  2 21:24:24 Ubuntu-1404-trusty-64-minimal sshd\[12322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.50.122
2019-08-03 08:02:57
198.27.70.61 attackspambots
Joomla HTTP User Agent Object Injection Vulnerability, PTR: ns525633.ip-198-27-70.net.
2019-08-03 08:17:24
77.247.108.31 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-03 07:48:30
83.97.20.36 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-03 07:50:09
61.53.0.138 attackbotsspam
23/tcp
[2019-08-02]1pkt
2019-08-03 07:57:07
203.107.32.61 attackspam
TCP SYN-ACK with data, PTR: PTR record not found
2019-08-03 08:04:49
77.247.110.250 attack
SIPVicious Scanner Detection, PTR: PTR record not found
2019-08-03 08:10:46
77.247.110.222 attackbots
SIPVicious Scanner Detection, PTR: PTR record not found
2019-08-03 08:12:56
165.227.220.178 attackspam
2019-08-02T22:07:33.488455abusebot-8.cloudsearch.cf sshd\[24042\]: Invalid user 123456 from 165.227.220.178 port 42424
2019-08-03 08:17:41
200.115.32.36 attackbotsspam
Aug  3 02:06:54 nextcloud sshd\[2659\]: Invalid user oracle from 200.115.32.36
Aug  3 02:06:54 nextcloud sshd\[2659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.115.32.36
Aug  3 02:06:56 nextcloud sshd\[2659\]: Failed password for invalid user oracle from 200.115.32.36 port 46582 ssh2
...
2019-08-03 08:07:09
13.52.51.69 attackbots
Persistent attack on port 80 lasting many hours
2019-08-03 07:58:04
177.158.84.124 attackspambots
Automatic report - Port Scan Attack
2019-08-03 08:33:43
139.59.170.23 attackspambots
Aug  3 02:02:55 vmd17057 sshd\[5236\]: Invalid user admin from 139.59.170.23 port 54326
Aug  3 02:02:55 vmd17057 sshd\[5236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.170.23
Aug  3 02:02:58 vmd17057 sshd\[5236\]: Failed password for invalid user admin from 139.59.170.23 port 54326 ssh2
...
2019-08-03 08:34:09

Recently Reported IPs

112.252.240.38 112.254.241.186 112.254.248.187 112.26.35.240
112.26.99.92 112.28.39.10 112.27.5.232 112.27.128.209
112.29.171.75 112.27.80.155 112.28.208.133 112.29.248.19
112.29.156.140 112.29.170.57 112.29.69.117 112.30.11.106
112.30.103.105 112.30.110.33 112.30.245.136 112.30.110.31