Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.197.113.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.197.113.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:48:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 30.113.197.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.113.197.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
65.49.20.94 attackbots
443/udp 443/udp 443/udp
[2019-10-05/24]3pkt
2019-10-24 12:56:42
118.39.77.194 attackspam
2323/tcp 23/tcp...
[2019-10-05/24]15pkt,2pt.(tcp)
2019-10-24 13:22:53
185.220.101.5 attackbots
Oct 24 04:46:23 thevastnessof sshd[4364]: Failed password for root from 185.220.101.5 port 40101 ssh2
...
2019-10-24 13:01:51
218.92.0.180 attack
Sep  7 10:24:23 microserver sshd[4794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Sep  7 10:24:25 microserver sshd[4794]: Failed password for root from 218.92.0.180 port 42969 ssh2
Sep  7 10:24:28 microserver sshd[4794]: Failed password for root from 218.92.0.180 port 42969 ssh2
Sep  7 10:24:31 microserver sshd[4794]: Failed password for root from 218.92.0.180 port 42969 ssh2
Sep  7 10:24:34 microserver sshd[4794]: Failed password for root from 218.92.0.180 port 42969 ssh2
Sep 21 03:30:03 microserver sshd[57567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
Sep 21 03:30:05 microserver sshd[57567]: Failed password for root from 218.92.0.180 port 10622 ssh2
Sep 21 03:30:09 microserver sshd[57567]: Failed password for root from 218.92.0.180 port 10622 ssh2
Sep 21 03:30:12 microserver sshd[57567]: Failed password for root from 218.92.0.180 port 10622 ssh2
Sep 21 03:30:15 microse
2019-10-24 13:16:19
41.217.216.39 attackbots
2019-10-24T04:33:19.523016shield sshd\[16343\]: Invalid user slurm from 41.217.216.39 port 47362
2019-10-24T04:33:19.530787shield sshd\[16343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.217.216.39
2019-10-24T04:33:20.953108shield sshd\[16343\]: Failed password for invalid user slurm from 41.217.216.39 port 47362 ssh2
2019-10-24T04:38:42.017364shield sshd\[17893\]: Invalid user munin from 41.217.216.39 port 57406
2019-10-24T04:38:42.021336shield sshd\[17893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.217.216.39
2019-10-24 12:49:38
13.58.56.77 attackbotsspam
WordPress wp-login brute force :: 13.58.56.77 0.132 BYPASS [24/Oct/2019:14:55:11  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3979 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36"
2019-10-24 12:45:12
170.245.49.126 attack
Oct 24 04:55:04 ms-srv sshd[16246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.245.49.126
2019-10-24 12:48:24
212.83.132.246 attackspam
Automatic report - Banned IP Access
2019-10-24 12:41:26
195.88.66.131 attackbots
2019-10-24T04:31:21.965876abusebot.cloudsearch.cf sshd\[19239\]: Invalid user deva from 195.88.66.131 port 48441
2019-10-24 13:19:13
82.64.15.106 attackspambots
SSH invalid-user multiple login try
2019-10-24 12:54:46
64.202.187.152 attack
Automatic report - Banned IP Access
2019-10-24 13:23:56
106.12.34.56 attackspambots
2019-10-24T06:56:45.882440  sshd[23088]: Invalid user xxx112 from 106.12.34.56 port 45988
2019-10-24T06:56:45.896680  sshd[23088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.56
2019-10-24T06:56:45.882440  sshd[23088]: Invalid user xxx112 from 106.12.34.56 port 45988
2019-10-24T06:56:47.674939  sshd[23088]: Failed password for invalid user xxx112 from 106.12.34.56 port 45988 ssh2
2019-10-24T07:01:46.195398  sshd[23179]: Invalid user powerg from 106.12.34.56 port 50026
...
2019-10-24 13:17:04
94.158.245.185 attackspambots
Oct 24 00:50:37 plusreed sshd[11573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.158.245.185  user=root
Oct 24 00:50:39 plusreed sshd[11573]: Failed password for root from 94.158.245.185 port 49966 ssh2
...
2019-10-24 12:52:48
217.25.40.26 attackspambots
Automatic report - XMLRPC Attack
2019-10-24 13:03:22
95.154.203.137 attack
Oct 24 05:51:07 OPSO sshd\[29532\]: Invalid user t3amspeak from 95.154.203.137 port 34431
Oct 24 05:51:07 OPSO sshd\[29532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.154.203.137
Oct 24 05:51:09 OPSO sshd\[29532\]: Failed password for invalid user t3amspeak from 95.154.203.137 port 34431 ssh2
Oct 24 05:55:11 OPSO sshd\[30254\]: Invalid user shazam from 95.154.203.137 port 54203
Oct 24 05:55:11 OPSO sshd\[30254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.154.203.137
2019-10-24 12:42:40

Recently Reported IPs

66.114.26.77 83.215.57.192 147.145.35.71 145.251.181.157
158.115.46.195 28.38.51.118 9.107.211.128 28.198.165.143
104.11.148.59 241.189.4.183 202.84.147.29 9.111.106.82
243.159.178.253 138.57.107.118 26.98.6.192 162.111.47.130
249.218.242.194 224.52.225.11 232.228.78.202 63.177.1.61