Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.30.173.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.30.173.139.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 15 00:06:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.173.30.117.in-addr.arpa domain name pointer 139.173.30.117.broad.xm.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.173.30.117.in-addr.arpa	name = 139.173.30.117.broad.xm.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.230.226.124 attackbotsspam
Port scan denied
2020-10-08 02:51:36
157.230.245.16 attackspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-08 02:42:17
14.191.111.131 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: static.vnpt.vn.
2020-10-08 02:46:58
162.247.72.199 attack
vps:pam-generic
2020-10-08 02:50:30
192.241.237.71 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(10061547)
2020-10-08 02:57:56
61.133.232.252 attack
Oct  7 20:10:49 vpn01 sshd[26533]: Failed password for root from 61.133.232.252 port 8570 ssh2
...
2020-10-08 02:54:24
98.142.143.152 attack
(sshd) Failed SSH login from 98.142.143.152 (US/United States/98.142.143.152.16clouds.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  7 19:33:21 elude sshd[1189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.142.143.152  user=root
Oct  7 19:33:23 elude sshd[1189]: Failed password for root from 98.142.143.152 port 43274 ssh2
Oct  7 19:53:08 elude sshd[4388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.142.143.152  user=root
Oct  7 19:53:11 elude sshd[4388]: Failed password for root from 98.142.143.152 port 44588 ssh2
Oct  7 20:05:17 elude sshd[6142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.142.143.152  user=root
2020-10-08 02:58:54
52.251.39.67 attackbotsspam
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.801+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="1135716333",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="20a89a556f1b13d21e39356081c3275b",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.852+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="3826012407",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/52.251.39.67/5543",Challenge="1602081665/60ef6b0a73f0862268ca43e21f04966e",Response="e6c9f20450368a272c66f99cf5c4bab0",ExpectedResponse=""
[2020-10-07 16:41:05] SECURITY[5295] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-10-07T16:41:05.92
...
2020-10-08 03:01:52
69.55.49.187 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-07T14:44:21Z and 2020-10-07T14:52:20Z
2020-10-08 02:39:48
106.13.83.202 attackspambots
Oct  7 19:28:25 marvibiene sshd[3326]: Failed password for root from 106.13.83.202 port 49332 ssh2
2020-10-08 02:47:42
88.214.26.29 attack
Multiport scan : 20 ports scanned 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399
2020-10-08 03:04:16
104.151.246.108 attackbots
SIP attack
2020-10-08 02:46:22
150.95.66.29 attackbots
Fail2Ban Ban Triggered
2020-10-08 03:06:20
198.12.157.28 attackspam
Dovecot Invalid User Login Attempt.
2020-10-08 03:11:36
193.203.60.61 attackbotsspam
Port scan denied
2020-10-08 02:35:41

Recently Reported IPs

117.30.172.92 205.139.134.180 117.30.173.157 117.30.173.218
117.30.173.58 117.30.177.0 117.30.178.51 117.30.178.82
21.82.237.120 117.30.179.132 117.30.190.10 117.30.190.104
117.30.190.108 117.30.190.110 117.30.190.116 117.30.190.118
117.30.190.121 117.30.191.11 117.30.191.14 117.30.204.100