Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.69.30.4 attackspam
Apr 13 06:53:37 elektron postfix/smtpd\[12073\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:54:10 elektron postfix/smtpd\[12822\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:54:47 elektron postfix/smtpd\[12822\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
Apr 13 06:55:20 elektron postfix/smtpd\[12073\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.4\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.4\]\; from=\ to=\ proto=ESMTP helo=\
2020-04-13 16:42:14
117.69.30.228 attack
Email spam message
2020-03-20 17:59:24
117.69.30.94 attackbots
IP: 117.69.30.94
Ports affected
    Simple Mail Transfer (25) 
Found in DNSBL('s)
ASN Details
   AS4134 No.31 Jin-rong Street
   China (CN)
   CIDR 117.64.0.0/13
Log Date: 24/02/2020 12:46:14 PM UTC
2020-02-24 21:31:28
117.69.30.162 attack
Feb  9 05:56:49 grey postfix/smtpd\[27745\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.162\]: 554 5.7.1 Service unavailable\; Client host \[117.69.30.162\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[117.69.30.162\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-09 14:38:12
117.69.30.194 attackspambots
Jan 22 13:53:20 grey postfix/smtpd\[7299\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.194\]: 554 5.7.1 Service unavailable\; Client host \[117.69.30.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[117.69.30.194\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-22 23:05:02
117.69.30.65 attackbots
Email spam message
2020-01-13 22:05:58
117.69.30.210 attackspambots
Jan  9 14:07:48 grey postfix/smtpd\[21981\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.210\]: 554 5.7.1 Service unavailable\; Client host \[117.69.30.210\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[117.69.30.210\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-10 00:10:06
117.69.30.32 attackbots
Jan  2 07:30:34 grey postfix/smtpd\[16335\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.32\]: 554 5.7.1 Service unavailable\; Client host \[117.69.30.32\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[117.69.30.32\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-02 14:52:09
117.69.30.7 attack
Dec 14 15:45:03 grey postfix/smtpd\[16976\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.7\]: 554 5.7.1 Service unavailable\; Client host \[117.69.30.7\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[117.69.30.7\]\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-15 00:11:10
117.69.30.216 attackspambots
badbot
2019-11-24 02:43:21
117.69.30.240 attackspambots
Brute force SMTP login attempts.
2019-11-01 07:36:52
117.69.30.106 attack
Brute force SMTP login attempts.
2019-10-20 14:40:16
117.69.30.132 attackbotsspam
Oct  2 06:53:42 elektron postfix/smtpd\[24015\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.132\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.132\]\; from=\ to=\ proto=ESMTP helo=\
Oct  2 06:54:14 elektron postfix/smtpd\[25425\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.132\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.132\]\; from=\ to=\ proto=ESMTP helo=\
Oct  2 06:54:45 elektron postfix/smtpd\[21398\]: NOQUEUE: reject: RCPT from unknown\[117.69.30.132\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[117.69.30.132\]\; from=\ to=\ proto=ESMTP helo=\
2019-10-02 12:58:14
117.69.30.20 attackbotsspam
Brute force attempt
2019-09-11 17:21:09
117.69.30.219 attackspambots
Brute force SMTP login attempts.
2019-08-30 13:58:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.69.30.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.69.30.147.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 416 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 22:34:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 147.30.69.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.30.69.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.75.149.106 attack
SSH BruteForce Attack
2020-09-26 07:13:14
182.61.4.60 attack
SSH Invalid Login
2020-09-26 07:39:23
132.232.60.183 attackbots
2020-09-26T00:36:57.604368vps773228.ovh.net sshd[19311]: Failed password for root from 132.232.60.183 port 41554 ssh2
2020-09-26T00:43:08.719265vps773228.ovh.net sshd[19351]: Invalid user dalia from 132.232.60.183 port 51430
2020-09-26T00:43:08.726427vps773228.ovh.net sshd[19351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.60.183
2020-09-26T00:43:08.719265vps773228.ovh.net sshd[19351]: Invalid user dalia from 132.232.60.183 port 51430
2020-09-26T00:43:10.445350vps773228.ovh.net sshd[19351]: Failed password for invalid user dalia from 132.232.60.183 port 51430 ssh2
...
2020-09-26 07:37:16
111.75.149.221 attack
Sep 25 22:54:09 mail.srvfarm.net postfix/smtpd[109362]: lost connection after CONNECT from unknown[111.75.149.221]
Sep 25 22:54:13 mail.srvfarm.net postfix/smtpd[109361]: warning: unknown[111.75.149.221]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 22:54:22 mail.srvfarm.net postfix/smtpd[109364]: warning: unknown[111.75.149.221]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 22:54:34 mail.srvfarm.net postfix/smtpd[110833]: warning: unknown[111.75.149.221]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 25 23:03:16 mail.srvfarm.net postfix/smtpd[110832]: lost connection after CONNECT from unknown[111.75.149.221]
2020-09-26 07:12:28
212.34.242.82 attack
lfd: (smtpauth) Failed SMTP AUTH login from 212.34.242.82 (AM/Armenia/ticketmx.kinopark.am): 5 in the last 3600 secs - Fri Aug 31 01:01:29 2018
2020-09-26 07:41:51
94.232.136.126 attackbots
Sep 25 23:21:42 vps639187 sshd\[18848\]: Invalid user registry from 94.232.136.126 port 9438
Sep 25 23:21:42 vps639187 sshd\[18848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126
Sep 25 23:21:43 vps639187 sshd\[18848\]: Failed password for invalid user registry from 94.232.136.126 port 9438 ssh2
...
2020-09-26 07:07:23
134.122.72.221 attack
Hits on port :
2020-09-26 07:05:30
116.59.25.190 attack
SSH Invalid Login
2020-09-26 07:12:05
175.139.1.34 attackspam
Sep 26 00:10:42 l02a sshd[7168]: Invalid user ly from 175.139.1.34
Sep 26 00:10:43 l02a sshd[7168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.1.34 
Sep 26 00:10:42 l02a sshd[7168]: Invalid user ly from 175.139.1.34
Sep 26 00:10:45 l02a sshd[7168]: Failed password for invalid user ly from 175.139.1.34 port 51670 ssh2
2020-09-26 07:36:29
51.178.43.9 attackspam
Sep 26 00:15:35 vps639187 sshd\[20649\]: Invalid user zk from 51.178.43.9 port 60268
Sep 26 00:15:35 vps639187 sshd\[20649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.43.9
Sep 26 00:15:38 vps639187 sshd\[20649\]: Failed password for invalid user zk from 51.178.43.9 port 60268 ssh2
...
2020-09-26 07:23:00
13.82.151.14 attackspambots
2020-09-25T18:54:15.624959ns386461 sshd\[6348\]: Invalid user trustshaadi from 13.82.151.14 port 56822
2020-09-25T18:54:15.631094ns386461 sshd\[6348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.151.14
2020-09-25T18:54:17.612627ns386461 sshd\[6348\]: Failed password for invalid user trustshaadi from 13.82.151.14 port 56822 ssh2
2020-09-26T00:56:31.467916ns386461 sshd\[17084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.151.14  user=root
2020-09-26T00:56:33.754518ns386461 sshd\[17084\]: Failed password for root from 13.82.151.14 port 20967 ssh2
...
2020-09-26 07:16:18
185.234.217.241 attack
lfd: (smtpauth) Failed SMTP AUTH login from 185.234.217.241 (-): 5 in the last 3600 secs - Fri Aug 31 18:44:52 2018
2020-09-26 07:38:16
59.126.3.251 attackspambots
Honeypot attack, port: 5555, PTR: 59-126-3-251.HINET-IP.hinet.net.
2020-09-26 07:20:11
139.155.225.13 attackbots
SSH Bruteforce attack
2020-09-26 07:19:44
188.166.84.195 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-26 07:29:59

Recently Reported IPs

114.231.45.203 117.69.30.144 117.69.30.175 117.69.30.157
117.69.30.14 117.69.30.161 117.69.30.139 117.69.30.183
117.69.30.203 117.69.30.199 114.231.45.204 117.69.30.220
117.69.30.226 117.69.30.222 117.69.30.209 117.69.30.250
117.69.30.254 117.69.30.232 117.69.30.30 117.69.30.44