Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
123.139.21.205 attackspambots
Brute force blocker - service: proftpd1 - aantal: 33 - Tue Apr 17 06:45:15 2018
2020-03-09 03:18:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.139.21.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.139.21.30.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:15:55 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 30.21.139.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.21.139.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.116.203 attackbotsspam
Jun 19 05:54:14  sshd\[13008\]: Invalid user jeferson from 106.13.116.203Jun 19 05:54:17  sshd\[13008\]: Failed password for invalid user jeferson from 106.13.116.203 port 55306 ssh2
...
2020-06-19 17:33:42
12.186.157.211 attackbotsspam
SSH login attempts.
2020-06-19 17:20:13
91.134.135.95 attackspambots
SSH Brute Force
2020-06-19 17:19:45
222.84.173.79 attack
1433/tcp
[2020-06-19]1pkt
2020-06-19 16:50:52
141.98.80.150 attackbotsspam
Jun 19 10:48:17 relay postfix/smtpd\[2292\]: warning: unknown\[141.98.80.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 10:48:36 relay postfix/smtpd\[2287\]: warning: unknown\[141.98.80.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 10:53:31 relay postfix/smtpd\[15969\]: warning: unknown\[141.98.80.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 10:53:51 relay postfix/smtpd\[2245\]: warning: unknown\[141.98.80.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 19 11:01:13 relay postfix/smtpd\[25581\]: warning: unknown\[141.98.80.150\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-19 17:14:16
167.71.111.16 attack
CMS (WordPress or Joomla) login attempt.
2020-06-19 17:26:59
194.180.224.93 attackbotsspam
123
2020-06-19 17:02:18
172.245.110.143 attackspam
DATE:2020-06-19 11:02:12, IP:172.245.110.143, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-06-19 17:24:41
40.74.70.145 attack
$f2bV_matches
2020-06-19 17:29:26
134.122.20.113 attack
2020-06-19T05:44:11.367080shield sshd\[30900\]: Invalid user brody from 134.122.20.113 port 60746
2020-06-19T05:44:11.371851shield sshd\[30900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113
2020-06-19T05:44:12.621080shield sshd\[30900\]: Failed password for invalid user brody from 134.122.20.113 port 60746 ssh2
2020-06-19T05:45:36.800948shield sshd\[31265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.20.113  user=root
2020-06-19T05:45:38.386876shield sshd\[31265\]: Failed password for root from 134.122.20.113 port 57678 ssh2
2020-06-19 17:14:41
185.255.55.29 attackspambots
SSH login attempts.
2020-06-19 17:20:42
108.183.151.208 attackspam
Invalid user fj from 108.183.151.208 port 47738
2020-06-19 17:04:49
218.87.140.49 attack
06/18/2020-23:54:53.349465 218.87.140.49 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-19 17:00:01
88.198.24.108 attack
SSH login attempts.
2020-06-19 17:28:28
129.28.154.240 attack
Invalid user pascal from 129.28.154.240 port 56908
2020-06-19 17:23:35

Recently Reported IPs

34.219.207.33 23.94.186.32 128.199.125.79 117.240.207.2
190.73.66.185 124.230.42.223 128.90.147.36 82.145.53.19
5.26.218.64 113.118.6.11 177.223.98.216 14.238.186.168
117.147.24.142 209.85.161.48 1.20.217.115 41.75.188.114
45.61.173.73 66.128.38.87 97.95.69.66 170.106.38.158