Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Bharat Sanchar Nigam Limited

Hostname: unknown

Organization: National Internet Backbone

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorised access (Jul  2) SRC=117.239.50.30 LEN=40 PREC=0x20 TTL=240 ID=4229 TCP DPT=445 WINDOW=1024 SYN
2019-07-02 12:06:06
attackspam
445/tcp 445/tcp 445/tcp...
[2019-04-28/06-26]12pkt,1pt.(tcp)
2019-06-26 23:40:42
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.239.50.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40402
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.239.50.30.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 18:47:44 +08 2019
;; MSG SIZE  rcvd: 117

Host info
30.50.239.117.in-addr.arpa domain name pointer static.ill.117.239.50.30/24.bsnl.in.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
30.50.239.117.in-addr.arpa	name = static.ill.117.239.50.30/24.bsnl.in.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
45.22.19.58 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-20 04:34:05
185.9.18.164 attackbotsspam
trying remote access to NAS as Admin
2020-08-20 04:16:08
112.85.42.87 attackspam
2020-08-19T20:26:45.185514shield sshd\[14718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-19T20:26:47.558863shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2
2020-08-19T20:26:49.808249shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2
2020-08-19T20:26:51.803244shield sshd\[14718\]: Failed password for root from 112.85.42.87 port 31337 ssh2
2020-08-19T20:27:48.923931shield sshd\[14783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-08-20 04:33:42
182.254.180.17 attack
Aug 19 16:50:55 cosmoit sshd[32467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.180.17
2020-08-20 04:02:23
206.189.176.134 attack
Aug 19 19:22:32 XXXXXX sshd[65491]: Invalid user oracle from 206.189.176.134 port 59158
2020-08-20 04:27:36
58.69.229.127 attackbots
Hit honeypot r.
2020-08-20 04:14:44
150.129.8.13 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-08-20 04:25:40
139.208.48.207 attackbots
Unauthorised access (Aug 19) SRC=139.208.48.207 LEN=40 TTL=46 ID=6681 TCP DPT=8080 WINDOW=28421 SYN
2020-08-20 04:27:24
129.211.22.160 attack
Brute-force attempt banned
2020-08-20 04:20:50
95.181.131.153 attackspambots
Aug 19 21:50:45 ns381471 sshd[24233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153
Aug 19 21:50:47 ns381471 sshd[24233]: Failed password for invalid user www from 95.181.131.153 port 51768 ssh2
2020-08-20 04:05:13
207.46.13.96 attack
Automatic report - Banned IP Access
2020-08-20 04:31:59
222.239.124.19 attack
detected by Fail2Ban
2020-08-20 04:31:36
103.210.21.207 attackbots
2020-08-19T18:34:37.446142abusebot.cloudsearch.cf sshd[16327]: Invalid user lucia from 103.210.21.207 port 41516
2020-08-19T18:34:37.451904abusebot.cloudsearch.cf sshd[16327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.21.207
2020-08-19T18:34:37.446142abusebot.cloudsearch.cf sshd[16327]: Invalid user lucia from 103.210.21.207 port 41516
2020-08-19T18:34:39.184028abusebot.cloudsearch.cf sshd[16327]: Failed password for invalid user lucia from 103.210.21.207 port 41516 ssh2
2020-08-19T18:41:19.218165abusebot.cloudsearch.cf sshd[16581]: Invalid user support from 103.210.21.207 port 51500
2020-08-19T18:41:19.223545abusebot.cloudsearch.cf sshd[16581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.21.207
2020-08-19T18:41:19.218165abusebot.cloudsearch.cf sshd[16581]: Invalid user support from 103.210.21.207 port 51500
2020-08-19T18:41:21.145910abusebot.cloudsearch.cf sshd[16581]: Failed pass
...
2020-08-20 04:04:33
182.71.221.78 attackspambots
SSH Login Bruteforce
2020-08-20 04:22:03
190.97.226.30 attackspam
Port Scan detected!
...
2020-08-20 04:01:01

Recently Reported IPs

112.17.175.61 186.112.214.158 197.50.199.81 197.50.199.23
196.219.65.255 132.232.66.231 218.108.73.61 125.11.61.233
70.43.188.125 164.77.47.150 205.209.162.155 95.168.72.116
120.32.125.26 39.98.249.129 144.22.105.126 139.199.65.251
172.241.247.188 36.91.164.53 42.236.10.117 185.141.217.167