Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medan

Region: Sumatera Utara

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.206.30.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65355
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.206.30.45.			IN	A

;; AUTHORITY SECTION:
.			218	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 09:04:43 CST 2023
;; MSG SIZE  rcvd: 106
Host info
45.30.206.116.in-addr.arpa domain name pointer subs34-116-206-30-45.three.co.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.30.206.116.in-addr.arpa	name = subs34-116-206-30-45.three.co.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.247.73.192 attackbotsspam
Feb 24 14:20:10 icecube sshd[40291]: Invalid user abell from 162.247.73.192 port 51668
2020-02-25 05:07:59
222.186.175.215 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
Failed password for root from 222.186.175.215 port 27146 ssh2
2020-02-25 05:31:07
175.169.172.11 attack
Telnet Server BruteForce Attack
2020-02-25 05:29:10
62.210.185.4 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-02-25 05:20:46
167.250.73.191 attackbots
firewall-block, port(s): 445/tcp
2020-02-25 05:07:35
45.191.214.237 attackbotsspam
Automatic report - Banned IP Access
2020-02-25 05:31:46
110.17.3.157 attack
[portscan] Port scan
2020-02-25 05:17:15
62.249.140.222 attack
Unauthorized connection attempt detected from IP address 62.249.140.222 to port 80
2020-02-25 05:19:37
14.187.131.36 attackbots
firewall-block, port(s): 23/tcp
2020-02-25 05:12:37
128.199.133.249 attackbotsspam
Feb 24 21:57:09 silence02 sshd[22963]: Failed password for root from 128.199.133.249 port 41501 ssh2
Feb 24 22:00:58 silence02 sshd[24536]: Failed password for root from 128.199.133.249 port 54804 ssh2
Feb 24 22:04:47 silence02 sshd[26251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
2020-02-25 05:22:20
211.114.176.244 attack
Hits on port : 8000
2020-02-25 05:38:58
132.145.187.218 attackspam
Automatic report - Port Scan
2020-02-25 05:02:10
149.72.164.91 attack
[ 📨 ] From bounces 3189618-aedd-lurigo=ovtlook.com.br@emailmkt.febracis.com.br Mon Feb 24 10:19:53 2020
Received: from wrqvxqrb.outbound-mail.sendgrid.net ([149.72.164.91]:17313)
2020-02-25 05:16:27
45.141.84.91 attackbots
Repeated RDP login failures. Last user: administrator
2020-02-25 05:17:00
93.23.199.53 attackspam
11 attempts against mh-mag-customerspam-ban on road
2020-02-25 05:24:06

Recently Reported IPs

114.79.0.129 128.101.65.152 140.116.182.152 193.218.36.36
140.116.247.87 128.189.178.136 140.116.163.183 140.116.183.63
103.44.37.207 198.102.159.112 140.116.250.198 140.116.183.11
193.227.20.176 140.116.253.184 115.178.207.0 103.47.133.129
150.161.2.9 140.116.44.73 140.116.122.28 140.116.54.45