Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.30.52.35 attackbots
[MK-VM4] Blocked by UFW
2020-07-29 03:08:29
117.30.52.24 attack
Web Server Attack
2020-01-20 03:36:04
117.30.52.106 attackbotsspam
Microsoft-Windows-Security-Auditing
2020-01-02 19:52:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.30.52.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.30.52.105.			IN	A

;; AUTHORITY SECTION:
.			386	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:13:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
105.52.30.117.in-addr.arpa domain name pointer 105.52.30.117.broad.xm.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.52.30.117.in-addr.arpa	name = 105.52.30.117.broad.xm.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.81.189.10 attack
Oct 10 21:56:01 mxgate1 postfix/postscreen[23232]: CONNECT from [191.81.189.10]:10373 to [176.31.12.44]:25
Oct 10 21:56:01 mxgate1 postfix/dnsblog[23255]: addr 191.81.189.10 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 10 21:56:01 mxgate1 postfix/dnsblog[23256]: addr 191.81.189.10 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 10 21:56:01 mxgate1 postfix/dnsblog[23256]: addr 191.81.189.10 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 10 21:56:01 mxgate1 postfix/dnsblog[23253]: addr 191.81.189.10 listed by domain bl.spamcop.net as 127.0.0.2
Oct 10 21:56:01 mxgate1 postfix/dnsblog[23254]: addr 191.81.189.10 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct 10 21:56:07 mxgate1 postfix/postscreen[23232]: DNSBL rank 5 for [191.81.189.10]:10373
Oct x@x
Oct 10 21:56:08 mxgate1 postfix/postscreen[23232]: HANGUP after 1.2 from [191.81.189.10]:10373 in tests after SMTP handshake
Oct 10 21:56:08 mxgate1 postfix/postscreen[23232]: DISCONNECT [191.81.189.10]:10373........
-------------------------------
2019-10-11 07:35:12
49.88.112.116 attackspambots
Oct 11 01:41:47 localhost sshd\[15221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Oct 11 01:41:50 localhost sshd\[15221\]: Failed password for root from 49.88.112.116 port 41602 ssh2
Oct 11 01:41:52 localhost sshd\[15221\]: Failed password for root from 49.88.112.116 port 41602 ssh2
2019-10-11 07:50:59
193.188.22.188 attackbots
Oct 10 21:17:50 XXXXXX sshd[46194]: Invalid user test01 from 193.188.22.188 port 35376
2019-10-11 07:44:40
63.83.73.110 attackbotsspam
Lines containing failures of 63.83.73.110


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.73.110
2019-10-11 07:29:56
117.158.82.21 attackbotsspam
Fail2Ban - FTP Abuse Attempt
2019-10-11 07:47:16
5.101.217.177 attackspambots
5.791.843,76-13/04 [bc18/m53] concatform PostRequest-Spammer scoring: Durban02
2019-10-11 08:01:21
127.0.0.1 attackbotsspam
Test Connectivity
2019-10-11 07:25:52
219.232.47.114 attackspam
fail2ban
2019-10-11 08:05:06
2606:4700:30::681f:4ade attackbots
Oct 10 20:05:02   DDOS Attack: SRC=2606:4700:0030:0000:0000:0000:681f:4ade DST=[Masked] LEN=72 TC=0 HOPLIMIT=60 FLOWLBL=65495 PROTO=TCP SPT=443 DPT=51930 WINDOW=27200 RES=0x00 ACK SYN URGP=0
2019-10-11 07:24:29
217.182.172.204 attack
Oct 11 01:28:36 SilenceServices sshd[1109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
Oct 11 01:28:38 SilenceServices sshd[1109]: Failed password for invalid user Testing111 from 217.182.172.204 port 56406 ssh2
Oct 11 01:32:19 SilenceServices sshd[3460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.172.204
2019-10-11 07:35:45
192.42.116.22 attack
2019-10-10T20:04:44.395811abusebot.cloudsearch.cf sshd\[26201\]: Invalid user usuario from 192.42.116.22 port 39700
2019-10-10T20:04:44.399769abusebot.cloudsearch.cf sshd\[26201\]: Failed none for invalid user usuario from 192.42.116.22 port 39700 ssh2
2019-10-11 08:02:06
185.232.30.130 attackbots
Port scan
2019-10-11 07:51:49
122.100.235.254 attackspam
Oct 10 16:04:22 localhost kernel: [4475681.687014] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.100.235.254 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=48 ID=50915 PROTO=TCP SPT=54885 DPT=82 WINDOW=18776 RES=0x00 SYN URGP=0 
Oct 10 16:04:22 localhost kernel: [4475681.687049] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.100.235.254 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=48 ID=50915 PROTO=TCP SPT=54885 DPT=82 SEQ=758669438 ACK=0 WINDOW=18776 RES=0x00 SYN URGP=0 OPT (020405AC) 
Oct 10 16:04:37 localhost kernel: [4475697.288644] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.100.235.254 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=48 ID=50915 PROTO=TCP SPT=54885 DPT=88 WINDOW=18776 RES=0x00 SYN URGP=0 
Oct 10 16:04:37 localhost kernel: [4475697.288671] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.100.235.254 DST=[mungedIP2] LEN=
2019-10-11 08:07:06
198.108.67.136 attackspambots
6443/tcp 27017/tcp 5902/tcp...
[2019-10-01/10]55pkt,27pt.(tcp)
2019-10-11 08:01:41
116.228.88.115 attack
Oct 10 23:06:51 icinga sshd[7071]: Failed password for root from 116.228.88.115 port 56576 ssh2
...
2019-10-11 07:36:40

Recently Reported IPs

117.30.52.113 117.30.52.144 117.30.52.140 114.224.20.240
117.30.52.13 117.30.52.150 117.30.52.18 117.30.52.184
117.30.52.183 117.30.52.122 117.30.52.142 114.224.20.29
114.224.20.37 114.224.20.38 114.224.20.42 114.224.20.47
114.224.20.52 114.224.20.58 117.30.54.52 4.118.127.22