Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.30.142.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.30.142.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:42:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 217.142.30.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.142.30.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.57.21 attackspam
Sep 19 01:09:33 aiointranet sshd\[5011\]: Invalid user gu from 104.248.57.21
Sep 19 01:09:33 aiointranet sshd\[5011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21
Sep 19 01:09:35 aiointranet sshd\[5011\]: Failed password for invalid user gu from 104.248.57.21 port 38666 ssh2
Sep 19 01:13:30 aiointranet sshd\[5303\]: Invalid user redereporter from 104.248.57.21
Sep 19 01:13:30 aiointranet sshd\[5303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.21
2019-09-19 19:25:40
187.87.38.201 attackspambots
Sep 19 13:19:56 ns37 sshd[17970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.38.201
Sep 19 13:19:58 ns37 sshd[17970]: Failed password for invalid user apache from 187.87.38.201 port 34744 ssh2
Sep 19 13:28:03 ns37 sshd[18413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.38.201
2019-09-19 19:33:57
1.192.218.141 attackspambots
Joomla! Core Session Remote Code Execution, PHP Diescan, ThinkPHP Request Method Remote Code Execution, Drupal Core Form Rendering Component Remote Code Execution, ThinkPHP Controller Parameter Remote Code Execution
2019-09-19 19:17:25
104.40.4.156 attackbots
Sep 19 13:28:29 rpi sshd[7223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.4.156 
Sep 19 13:28:31 rpi sshd[7223]: Failed password for invalid user pass from 104.40.4.156 port 30848 ssh2
2019-09-19 19:40:13
104.197.185.83 attackspam
Unauthorized access to SSH at 19/Sep/2019:11:07:38 +0000.
2019-09-19 19:09:47
103.131.24.140 attackbotsspam
Automatic report - Port Scan Attack
2019-09-19 19:41:08
59.42.100.123 attack
Unauthorised access (Sep 19) SRC=59.42.100.123 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=61390 TCP DPT=8080 WINDOW=62067 SYN
2019-09-19 19:26:25
3.91.247.221 attack
WordPress wp-login brute force :: 3.91.247.221 0.048 BYPASS [19/Sep/2019:20:58:10  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-19 19:29:50
178.128.112.98 attackbotsspam
Fail2Ban Ban Triggered
2019-09-19 19:22:05
104.197.185.83 attackspambots
Sep 19 13:50:11 intra sshd\[13298\]: Failed password for root from 104.197.185.83 port 38786 ssh2Sep 19 13:50:12 intra sshd\[13303\]: Invalid user admin from 104.197.185.83Sep 19 13:50:14 intra sshd\[13303\]: Failed password for invalid user admin from 104.197.185.83 port 55244 ssh2Sep 19 13:50:16 intra sshd\[13305\]: Invalid user admin from 104.197.185.83Sep 19 13:50:17 intra sshd\[13305\]: Failed password for invalid user admin from 104.197.185.83 port 43774 ssh2Sep 19 13:50:21 intra sshd\[13307\]: Invalid user user from 104.197.185.83
...
2019-09-19 18:54:59
180.179.174.247 attack
Sep 19 13:27:13 OPSO sshd\[4470\]: Invalid user transfer from 180.179.174.247 port 39021
Sep 19 13:27:13 OPSO sshd\[4470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.174.247
Sep 19 13:27:15 OPSO sshd\[4470\]: Failed password for invalid user transfer from 180.179.174.247 port 39021 ssh2
Sep 19 13:32:50 OPSO sshd\[5523\]: Invalid user rabe from 180.179.174.247 port 60004
Sep 19 13:32:50 OPSO sshd\[5523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.174.247
2019-09-19 19:38:55
37.114.186.96 attackspambots
ssh failed login
2019-09-19 18:52:31
218.92.0.160 attack
Sep 19 11:21:55 game-panel sshd[13159]: Failed password for root from 218.92.0.160 port 60300 ssh2
Sep 19 11:21:58 game-panel sshd[13159]: Failed password for root from 218.92.0.160 port 60300 ssh2
Sep 19 11:22:01 game-panel sshd[13159]: Failed password for root from 218.92.0.160 port 60300 ssh2
Sep 19 11:22:04 game-panel sshd[13159]: Failed password for root from 218.92.0.160 port 60300 ssh2
2019-09-19 19:38:36
129.28.115.92 attack
Sep 19 01:13:02 web1 sshd\[24295\]: Invalid user wpyan from 129.28.115.92
Sep 19 01:13:02 web1 sshd\[24295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
Sep 19 01:13:03 web1 sshd\[24295\]: Failed password for invalid user wpyan from 129.28.115.92 port 51158 ssh2
Sep 19 01:18:13 web1 sshd\[24783\]: Invalid user lisherness from 129.28.115.92
Sep 19 01:18:13 web1 sshd\[24783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
2019-09-19 19:23:14
222.186.31.144 attackspam
Sep 19 07:19:49 plusreed sshd[3291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
Sep 19 07:19:51 plusreed sshd[3291]: Failed password for root from 222.186.31.144 port 25799 ssh2
...
2019-09-19 19:33:18

Recently Reported IPs

136.139.179.40 185.50.67.177 63.99.126.32 74.161.139.151
79.191.22.111 239.8.20.54 122.186.227.14 26.153.130.22
219.69.116.165 234.191.118.222 237.165.228.56 205.3.70.98
150.126.126.129 146.152.161.1 160.108.207.199 212.161.244.222
33.181.116.152 31.227.149.172 163.107.162.243 54.18.200.103