Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.97.45.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.97.45.30.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:36:39 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 30.45.97.118.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 118.97.45.30.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
219.77.103.238 attack
Sep 23 20:05:50 root sshd[25275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=n219077103238.netvigator.com  user=root
Sep 23 20:05:53 root sshd[25275]: Failed password for root from 219.77.103.238 port 49132 ssh2
...
2020-09-24 03:47:14
46.101.43.224 attackspam
"Unauthorized connection attempt on SSHD detected"
2020-09-24 03:21:09
40.118.226.96 attack
fail2ban
2020-09-24 03:49:47
219.77.104.197 attack
Sep 23 20:05:45 root sshd[25208]: Invalid user osmc from 219.77.104.197
...
2020-09-24 03:53:55
151.228.115.204 attack
Automatic report - Port Scan Attack
2020-09-24 03:56:53
150.109.151.206 attackbotsspam
20 attempts against mh-ssh on pcx
2020-09-24 03:22:24
114.40.56.199 attackspambots
Brute-force attempt banned
2020-09-24 03:52:44
102.222.182.41 attack
Email rejected due to spam filtering
2020-09-24 03:25:46
51.77.220.127 attack
51.77.220.127 - - [23/Sep/2020:23:35:01 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-09-24 03:44:21
218.191.190.89 attackspam
Brute-force attempt banned
2020-09-24 03:24:59
121.131.134.206 attackspam
Sep 23 20:05:52 root sshd[25279]: Invalid user admin from 121.131.134.206
...
2020-09-24 03:48:50
195.142.112.244 attackbots
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=51338  .  dstport=1433  .     (1846)
2020-09-24 03:27:49
84.216.173.206 attackspam
Sep 23 20:05:45 root sshd[25215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84-216-173-206.customers.ownit.se  user=root
Sep 23 20:05:47 root sshd[25215]: Failed password for root from 84.216.173.206 port 41645 ssh2
...
2020-09-24 03:51:27
189.251.73.140 attack
1600880744 - 09/23/2020 19:05:44 Host: 189.251.73.140/189.251.73.140 Port: 445 TCP Blocked
2020-09-24 03:55:54
91.216.133.165 attackspam
Sep 23 19:09:18 ssh2 sshd[72271]: Invalid user admin from 91.216.133.165 port 61015
Sep 23 19:09:19 ssh2 sshd[72271]: Failed password for invalid user admin from 91.216.133.165 port 61015 ssh2
Sep 23 19:09:19 ssh2 sshd[72271]: Connection closed by invalid user admin 91.216.133.165 port 61015 [preauth]
...
2020-09-24 03:43:09

Recently Reported IPs

115.98.51.187 118.97.44.106 118.97.45.14 118.97.41.52
118.97.45.10 118.97.44.154 118.97.45.139 118.97.42.156
118.97.45.254 118.97.45.27 118.97.43.154 118.97.42.155
115.98.51.207 118.97.51.250 118.97.45.43 118.97.45.54
118.97.46.106 115.99.142.60 118.97.47.12 118.97.50.103