Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.30.34.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.30.34.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025082701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 28 10:55:25 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 8.34.30.129.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 129.30.34.8.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
114.39.38.149 attackspambots
23/tcp
[2019-08-06]1pkt
2019-08-07 11:58:17
106.75.15.142 attack
Automatic report - Banned IP Access
2019-08-07 11:45:42
118.136.227.224 attackbotsspam
60001/tcp
[2019-08-06]1pkt
2019-08-07 11:36:36
43.226.124.10 attackbotsspam
445/tcp
[2019-08-06]1pkt
2019-08-07 11:25:51
68.173.45.11 attack
445/tcp 445/tcp 445/tcp
[2019-08-06]3pkt
2019-08-07 11:56:13
179.104.237.173 attack
81/tcp
[2019-08-06]1pkt
2019-08-07 11:55:25
162.252.57.27 attackspambots
445/tcp
[2019-08-06]1pkt
2019-08-07 11:34:37
27.115.124.6 attackbotsspam
3389BruteforceFW21
2019-08-07 11:35:26
47.91.107.159 attackspambots
37215/tcp
[2019-08-06]1pkt
2019-08-07 11:23:34
222.85.139.106 attackbotsspam
139/tcp 139/tcp
[2019-08-06]2pkt
2019-08-07 11:19:41
165.227.41.91 attack
Aug  6 23:38:19 dev0-dcde-rnet sshd[28844]: Failed password for root from 165.227.41.91 port 39296 ssh2
Aug  6 23:38:19 dev0-dcde-rnet sshd[28844]: error: Received disconnect from 165.227.41.91 port 39296:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Aug  6 23:38:24 dev0-dcde-rnet sshd[28846]: Failed password for root from 165.227.41.91 port 39724 ssh2
2019-08-07 12:17:32
115.238.99.170 attackspam
139/tcp
[2019-08-06]1pkt
2019-08-07 11:38:06
95.30.205.182 attackbots
445/tcp 139/tcp
[2019-08-06]2pkt
2019-08-07 12:17:53
197.33.162.176 attackbotsspam
23/tcp
[2019-08-06]1pkt
2019-08-07 11:14:24
143.208.180.212 attackspambots
'Fail2Ban'
2019-08-07 11:36:01

Recently Reported IPs

185.8.50.217 43.132.29.135 58.136.173.2 183.207.45.109
91.103.211.43 147.185.132.78 52.216.153.243 10.0.76.23
159.226.45.60 10.0.76.48 120.233.87.36 172.32.17.67
10.138.235.235 195.86.109.147 38.182.107.22 49.117.188.64
162.216.149.246 209.97.139.86 10.10.1.114 216.167.79.214