Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.30.150.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.30.150.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:49:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.150.30.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.150.30.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.26.28.68 attack
Unauthorized connection attempt detected from IP address 223.26.28.68 to port 445
2020-05-11 03:13:22
117.144.189.69 attackspambots
May 10 20:14:02 minden010 sshd[15430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.189.69
May 10 20:14:04 minden010 sshd[15430]: Failed password for invalid user gestore from 117.144.189.69 port 21423 ssh2
May 10 20:17:45 minden010 sshd[16665]: Failed password for root from 117.144.189.69 port 35462 ssh2
...
2020-05-11 02:45:26
183.136.143.188 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 03:10:47
139.59.60.196 attack
May 10 14:46:18 wordpress wordpress(www.ruhnke.cloud)[4670]: Blocked authentication attempt for admin from ::ffff:139.59.60.196
2020-05-11 02:52:31
188.254.0.124 attackspambots
5x Failed Password
2020-05-11 02:51:46
79.53.169.204 attackspam
Honeypot attack, port: 81, PTR: host204-169-dynamic.53-79-r.retail.telecomitalia.it.
2020-05-11 03:16:38
196.191.79.72 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 02:57:36
98.103.168.234 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-05-11 03:01:50
190.69.27.137 attack
 TCP (SYN) 190.69.27.137:56486 -> port 1433, len 44
2020-05-11 02:52:20
119.193.43.31 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-05-11 03:19:15
80.82.65.253 attackbots
Persistent port scanner - incrediserve - uses various IP Addresses
2020-05-11 03:07:17
87.251.74.166 attackspam
May 10 20:36:30 debian-2gb-nbg1-2 kernel: \[11394661.138942\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=40294 PROTO=TCP SPT=55324 DPT=3366 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-11 02:58:44
159.203.241.101 attackbots
Automatic report - WordPress Brute Force
2020-05-11 03:21:09
174.96.80.251 attackspam
Honeypot attack, port: 5555, PTR: cpe-174-96-80-251.neo.res.rr.com.
2020-05-11 03:20:46
218.2.220.254 attackbotsspam
May 10 21:15:56 santamaria sshd\[18059\]: Invalid user earleen from 218.2.220.254
May 10 21:15:56 santamaria sshd\[18059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.2.220.254
May 10 21:15:58 santamaria sshd\[18059\]: Failed password for invalid user earleen from 218.2.220.254 port 16016 ssh2
...
2020-05-11 03:20:00

Recently Reported IPs

92.237.137.215 126.227.183.98 14.251.76.63 18.203.99.228
157.157.162.20 91.217.181.158 246.28.230.85 206.144.94.46
181.175.159.45 181.26.254.199 212.185.244.22 149.45.146.188
215.183.70.152 57.183.225.73 49.13.253.170 152.131.93.138
91.23.132.28 195.71.56.251 234.125.243.132 46.70.54.95