Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Itami

Region: Hyōgo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.69.54.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.69.54.30.			IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090700 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 07 21:42:02 CST 2024
;; MSG SIZE  rcvd: 105
Host info
30.54.69.112.in-addr.arpa domain name pointer 112-69-54-30f1.hyg1.eonet.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.54.69.112.in-addr.arpa	name = 112-69-54-30f1.hyg1.eonet.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.42.118.169 attackspam
DATE:2020-02-01 14:35:57, IP:77.42.118.169, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-02 00:47:38
86.153.26.69 attackbotsspam
Automatic report - Port Scan Attack
2020-02-02 00:19:00
148.240.238.91 attackbotsspam
Unauthorized connection attempt detected from IP address 148.240.238.91 to port 2220 [J]
2020-02-02 00:06:14
87.237.34.200 attack
20905/tcp 21881/tcp
[2020-01-30]2pkt
2020-02-02 00:34:16
109.225.103.168 attackspambots
Unauthorized connection attempt detected from IP address 109.225.103.168 to port 5555 [J]
2020-02-02 00:32:51
141.212.123.203 attack
7/tcp 7/tcp 7/tcp...
[2019-12-07/2020-02-01]5pkt,1pt.(tcp)
2020-02-02 00:19:56
45.141.84.44 attackbots
Unauthorized connection attempt detected from IP address 45.141.84.44 to port 555 [T]
2020-02-02 00:20:42
146.185.183.65 attackspambots
...
2020-02-02 00:49:47
146.185.181.64 attackspam
...
2020-02-02 00:51:41
203.148.53.227 attackspambots
Unauthorized connection attempt detected from IP address 203.148.53.227 to port 2220 [J]
2020-02-02 00:40:25
147.135.54.82 attack
...
2020-02-02 00:30:07
123.207.171.211 attackspam
Feb  1 17:48:16 server sshd\[12709\]: Invalid user labuser from 123.207.171.211
Feb  1 17:48:16 server sshd\[12709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.171.211 
Feb  1 17:48:17 server sshd\[12709\]: Failed password for invalid user labuser from 123.207.171.211 port 44822 ssh2
Feb  1 17:55:48 server sshd\[14615\]: Invalid user demo from 123.207.171.211
Feb  1 17:55:48 server sshd\[14615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.171.211 
...
2020-02-02 00:49:33
147.135.156.89 attackbots
...
2020-02-02 00:33:44
112.85.42.94 attack
Feb  1 15:59:03 game-panel sshd[7985]: Failed password for root from 112.85.42.94 port 50299 ssh2
Feb  1 16:00:37 game-panel sshd[8060]: Failed password for root from 112.85.42.94 port 10076 ssh2
2020-02-02 00:08:06
182.73.45.90 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 00:36:06

Recently Reported IPs

112.7.149.33 112.69.78.113 112.69.22.99 112.7.176.154
112.69.236.110 112.69.42.240 112.69.153.249 112.69.228.170
112.69.205.56 112.69.84.141 112.7.197.135 112.7.230.2
112.7.181.239 112.69.4.81 112.69.238.113 112.69.115.41
112.69.243.69 112.69.16.143 112.68.97.75 112.69.190.33