Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.30.45.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42914
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.30.45.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:29:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 158.45.30.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.45.30.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
172.96.16.86 attack
2020-08-07T06:23:01.712090amanda2.illicoweb.com sshd\[9024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.16.86.16clouds.com  user=root
2020-08-07T06:23:03.271608amanda2.illicoweb.com sshd\[9024\]: Failed password for root from 172.96.16.86 port 56690 ssh2
2020-08-07T06:25:52.237332amanda2.illicoweb.com sshd\[9690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.16.86.16clouds.com  user=root
2020-08-07T06:25:53.941934amanda2.illicoweb.com sshd\[9690\]: Failed password for root from 172.96.16.86 port 44106 ssh2
2020-08-07T06:28:40.174057amanda2.illicoweb.com sshd\[10317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.16.86.16clouds.com  user=root
...
2020-08-07 16:09:30
114.69.249.194 attackspambots
Aug  7 06:28:38 ns37 sshd[9803]: Failed password for root from 114.69.249.194 port 50115 ssh2
Aug  7 06:28:38 ns37 sshd[9803]: Failed password for root from 114.69.249.194 port 50115 ssh2
2020-08-07 16:32:59
181.30.20.162 attackspam
2020-08-07T06:24:40.513340abusebot-2.cloudsearch.cf sshd[22263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.20.162  user=root
2020-08-07T06:24:42.433021abusebot-2.cloudsearch.cf sshd[22263]: Failed password for root from 181.30.20.162 port 33939 ssh2
2020-08-07T06:27:41.196942abusebot-2.cloudsearch.cf sshd[22277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.20.162  user=root
2020-08-07T06:27:42.965861abusebot-2.cloudsearch.cf sshd[22277]: Failed password for root from 181.30.20.162 port 19345 ssh2
2020-08-07T06:29:36.039125abusebot-2.cloudsearch.cf sshd[22279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.20.162  user=root
2020-08-07T06:29:38.259919abusebot-2.cloudsearch.cf sshd[22279]: Failed password for root from 181.30.20.162 port 14866 ssh2
2020-08-07T06:31:30.935346abusebot-2.cloudsearch.cf sshd[22295]: pam_unix(sshd:auth): authe
...
2020-08-07 16:17:22
66.70.130.144 attackspambots
(sshd) Failed SSH login from 66.70.130.144 (CA/Canada/ip144.ip-66-70-130.net): 10 in the last 3600 secs
2020-08-07 16:47:03
52.172.156.159 attackspambots
Aug  7 05:47:43 piServer sshd[16620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.156.159 
Aug  7 05:47:45 piServer sshd[16620]: Failed password for invalid user 1qaz2wsx1234 from 52.172.156.159 port 45616 ssh2
Aug  7 05:52:59 piServer sshd[17085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.156.159 
...
2020-08-07 16:26:21
36.133.16.69 attackbotsspam
Aug  7 06:53:18 ns3033917 sshd[1541]: Failed password for root from 36.133.16.69 port 33310 ssh2
Aug  7 06:56:27 ns3033917 sshd[1577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.16.69  user=root
Aug  7 06:56:28 ns3033917 sshd[1577]: Failed password for root from 36.133.16.69 port 43940 ssh2
...
2020-08-07 16:17:44
159.203.179.230 attackspambots
*Port Scan* detected from 159.203.179.230 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 241 seconds
2020-08-07 16:34:13
24.88.70.74 attack
2020-08-07T05:53:34+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-08-07 16:09:00
91.204.248.28 attackspambots
SSH Brute Force
2020-08-07 16:29:25
122.51.83.4 attack
2020-08-07T07:35:44.128231amanda2.illicoweb.com sshd\[23148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.4  user=root
2020-08-07T07:35:46.319010amanda2.illicoweb.com sshd\[23148\]: Failed password for root from 122.51.83.4 port 33302 ssh2
2020-08-07T07:38:41.567569amanda2.illicoweb.com sshd\[23623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.4  user=root
2020-08-07T07:38:43.390974amanda2.illicoweb.com sshd\[23623\]: Failed password for root from 122.51.83.4 port 43718 ssh2
2020-08-07T07:41:25.741033amanda2.illicoweb.com sshd\[24073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.4  user=root
...
2020-08-07 16:36:58
168.61.209.45 attack
Port Scan
...
2020-08-07 16:19:45
138.68.75.113 attackspam
$f2bV_matches
2020-08-07 16:41:58
189.202.204.230 attackbots
2020-08-07T07:31:12.229275amanda2.illicoweb.com sshd\[22339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230  user=root
2020-08-07T07:31:14.078860amanda2.illicoweb.com sshd\[22339\]: Failed password for root from 189.202.204.230 port 46731 ssh2
2020-08-07T07:33:12.010680amanda2.illicoweb.com sshd\[22703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230  user=root
2020-08-07T07:33:13.333518amanda2.illicoweb.com sshd\[22703\]: Failed password for root from 189.202.204.230 port 38230 ssh2
2020-08-07T07:35:09.215002amanda2.illicoweb.com sshd\[23058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230  user=root
...
2020-08-07 16:36:25
185.74.5.156 attackspambots
2020-08-07T08:47:42.036277amanda2.illicoweb.com sshd\[35863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
2020-08-07T08:47:43.348078amanda2.illicoweb.com sshd\[35863\]: Failed password for root from 185.74.5.156 port 52584 ssh2
2020-08-07T08:49:40.895894amanda2.illicoweb.com sshd\[36172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
2020-08-07T08:49:42.739724amanda2.illicoweb.com sshd\[36172\]: Failed password for root from 185.74.5.156 port 35544 ssh2
2020-08-07T08:51:38.110221amanda2.illicoweb.com sshd\[36532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
...
2020-08-07 16:33:50
61.133.232.249 attack
Aug  7 09:57:24 ovpn sshd\[28358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.249  user=root
Aug  7 09:57:26 ovpn sshd\[28358\]: Failed password for root from 61.133.232.249 port 8929 ssh2
Aug  7 10:00:06 ovpn sshd\[29603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.249  user=root
Aug  7 10:00:08 ovpn sshd\[29603\]: Failed password for root from 61.133.232.249 port 27083 ssh2
Aug  7 10:05:41 ovpn sshd\[32083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.249  user=root
2020-08-07 16:34:28

Recently Reported IPs

153.236.160.166 60.50.194.129 42.248.209.166 43.220.37.88
156.20.25.27 14.202.38.128 34.59.212.156 4.249.191.107
23.81.209.99 3.61.229.233 76.19.42.31 253.52.248.255
195.190.214.218 23.235.40.115 186.57.1.191 192.7.201.197
241.25.85.22 208.228.28.54 81.199.218.17 129.15.140.74