Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.241.99.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.241.99.30.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 20:42:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 30.99.241.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.99.241.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.62.175.162 attackspambots
Invalid user kasie from 117.62.175.162 port 55976
2020-04-30 00:54:36
210.186.122.28 attackspam
Invalid user ob from 210.186.122.28 port 57137
2020-04-30 01:17:43
139.199.27.174 attack
Invalid user test from 139.199.27.174 port 43886
2020-04-30 00:50:27
104.211.115.53 attackspam
Failed password for root from 104.211.115.53 port 33148 ssh2
2020-04-30 00:59:42
124.40.244.199 attack
Invalid user frank from 124.40.244.199 port 37384
2020-04-30 00:52:58
62.234.114.92 attack
Failed password for root from 62.234.114.92 port 53908 ssh2
2020-04-30 01:04:27
14.185.91.231 attackspambots
Invalid user supervisor from 14.185.91.231 port 55915
2020-04-30 01:12:47
81.183.222.181 attack
Invalid user admin from 81.183.222.181 port 54038
2020-04-30 01:01:56
35.194.69.197 attack
Invalid user miket from 35.194.69.197 port 40568
2020-04-30 01:08:26
159.89.153.54 attackbotsspam
Apr 29 15:32:37 IngegnereFirenze sshd[17419]: Failed password for invalid user zb from 159.89.153.54 port 52662 ssh2
...
2020-04-30 01:27:54
185.47.65.30 attackspambots
Apr 29 10:49:18 NPSTNNYC01T sshd[24757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30
Apr 29 10:49:20 NPSTNNYC01T sshd[24757]: Failed password for invalid user mc from 185.47.65.30 port 50512 ssh2
Apr 29 10:54:48 NPSTNNYC01T sshd[25165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30
...
2020-04-30 01:23:54
163.172.118.125 attackspam
$f2bV_matches
2020-04-30 01:27:32
200.107.13.18 attackbots
Invalid user zk from 200.107.13.18 port 59206
2020-04-30 01:19:42
180.76.141.221 attackbots
$f2bV_matches
2020-04-30 00:45:28
182.61.10.142 attack
Failed password for root from 182.61.10.142 port 47932 ssh2
2020-04-30 00:45:01

Recently Reported IPs

117.241.99.34 117.241.99.36 117.241.99.38 117.241.99.40
117.241.99.26 117.241.99.42 117.241.99.46 117.241.99.48
117.241.99.50 117.241.99.5 114.215.63.229 117.241.99.55
117.241.99.56 117.241.99.53 117.241.99.61 117.241.99.62
117.241.99.58 117.241.99.66 117.241.99.70 117.241.99.72