Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.30.53.215 attack
3389BruteforceFW23
2019-11-10 03:18:31
117.30.53.82 attackbots
Automated reporting of SSH Vulnerability scanning
2019-10-01 21:46:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.30.53.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.30.53.130.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030600 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 16:50:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
130.53.30.117.in-addr.arpa domain name pointer 130.53.30.117.broad.xm.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.53.30.117.in-addr.arpa	name = 130.53.30.117.broad.xm.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
107.170.37.74 attackbotsspam
$f2bV_matches
2020-04-27 14:52:36
175.24.139.99 attack
$f2bV_matches
2020-04-27 14:52:11
34.87.24.216 attackbotsspam
...
2020-04-27 14:57:22
222.186.30.35 attackspambots
Apr 27 08:39:44 vps sshd[564907]: Failed password for root from 222.186.30.35 port 57650 ssh2
Apr 27 08:39:47 vps sshd[564907]: Failed password for root from 222.186.30.35 port 57650 ssh2
Apr 27 08:40:01 vps sshd[566368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Apr 27 08:40:03 vps sshd[566368]: Failed password for root from 222.186.30.35 port 16054 ssh2
Apr 27 08:40:05 vps sshd[566368]: Failed password for root from 222.186.30.35 port 16054 ssh2
...
2020-04-27 14:42:10
179.104.18.111 attackspam
Unauthorised access (Apr 27) SRC=179.104.18.111 LEN=52 TTL=112 ID=29471 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-27 14:24:01
94.237.27.142 attackspam
$f2bV_matches
2020-04-27 14:35:05
200.146.215.26 attackbotsspam
Apr 27 07:03:46 meumeu sshd[21432]: Failed password for root from 200.146.215.26 port 16771 ssh2
Apr 27 07:07:59 meumeu sshd[22025]: Failed password for root from 200.146.215.26 port 1682 ssh2
...
2020-04-27 14:17:05
64.225.58.236 attack
2020-04-27T02:28:42.0175531495-001 sshd[43422]: Failed password for invalid user opal from 64.225.58.236 port 39020 ssh2
2020-04-27T02:31:07.8557021495-001 sshd[43576]: Invalid user ubuntu from 64.225.58.236 port 54664
2020-04-27T02:31:07.8627741495-001 sshd[43576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.58.236
2020-04-27T02:31:07.8557021495-001 sshd[43576]: Invalid user ubuntu from 64.225.58.236 port 54664
2020-04-27T02:31:10.2953981495-001 sshd[43576]: Failed password for invalid user ubuntu from 64.225.58.236 port 54664 ssh2
2020-04-27T02:33:31.8813021495-001 sshd[43749]: Invalid user avendoria from 64.225.58.236 port 42058
...
2020-04-27 14:55:32
45.88.12.82 attackspam
Apr 27 05:46:27 XXX sshd[3404]: Invalid user testadmin from 45.88.12.82 port 56022
2020-04-27 14:43:06
222.186.31.166 attack
Apr 27 06:13:26 124388 sshd[9350]: Failed password for root from 222.186.31.166 port 60661 ssh2
Apr 27 06:13:29 124388 sshd[9350]: Failed password for root from 222.186.31.166 port 60661 ssh2
Apr 27 06:13:31 124388 sshd[9350]: Failed password for root from 222.186.31.166 port 60661 ssh2
Apr 27 06:13:34 124388 sshd[9363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Apr 27 06:13:36 124388 sshd[9363]: Failed password for root from 222.186.31.166 port 48627 ssh2
2020-04-27 14:16:42
157.230.150.102 attackbots
Apr 27 07:40:30 vps sshd[250473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102  user=root
Apr 27 07:40:32 vps sshd[250473]: Failed password for root from 157.230.150.102 port 39798 ssh2
Apr 27 07:44:50 vps sshd[269424]: Invalid user icc from 157.230.150.102 port 53268
Apr 27 07:44:50 vps sshd[269424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.150.102
Apr 27 07:44:52 vps sshd[269424]: Failed password for invalid user icc from 157.230.150.102 port 53268 ssh2
...
2020-04-27 14:25:29
178.128.226.2 attackbotsspam
Apr 27 09:11:14 lukav-desktop sshd\[26717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
Apr 27 09:11:15 lukav-desktop sshd\[26717\]: Failed password for root from 178.128.226.2 port 40719 ssh2
Apr 27 09:15:06 lukav-desktop sshd\[1226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
Apr 27 09:15:08 lukav-desktop sshd\[1226\]: Failed password for root from 178.128.226.2 port 46373 ssh2
Apr 27 09:18:59 lukav-desktop sshd\[1373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2  user=root
2020-04-27 14:30:42
187.188.83.115 attackspambots
$f2bV_matches
2020-04-27 14:48:32
46.219.3.139 attackspambots
Apr 27 08:40:01 srv206 sshd[13953]: Invalid user db2fenc1 from 46.219.3.139
Apr 27 08:40:01 srv206 sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=relay.doris-adv.com
Apr 27 08:40:01 srv206 sshd[13953]: Invalid user db2fenc1 from 46.219.3.139
Apr 27 08:40:03 srv206 sshd[13953]: Failed password for invalid user db2fenc1 from 46.219.3.139 port 36112 ssh2
...
2020-04-27 14:41:26
50.194.122.164 attack
ssh brute force
2020-04-27 14:42:47

Recently Reported IPs

115.218.221.62 117.30.53.137 117.30.53.139 117.30.53.141
117.30.53.143 117.30.53.144 117.30.53.15 117.30.53.153
117.30.53.156 117.30.53.164 115.219.134.172 115.219.134.2
117.30.53.167 115.219.134.184 115.219.132.84 115.219.134.175
115.219.134.200 115.219.134.160 115.219.134.212 115.219.134.176