Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.30.154.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.30.154.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 00:28:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'86.154.30.139.in-addr.arpa domain name pointer med.uni-rostock.de.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.154.30.139.in-addr.arpa	name = med.uni-rostock.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.182.56.85 attack
SQL Injection Exploit Attempts
2019-07-01 05:42:53
202.88.241.107 attackspam
Invalid user www from 202.88.241.107 port 42170
2019-07-01 05:47:58
192.241.181.125 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-01 05:23:45
87.98.165.250 attackspambots
WordPress login Brute force / Web App Attack
2019-07-01 05:46:42
186.81.30.184 attack
ssh failed login
2019-07-01 06:01:47
51.77.146.153 attackbotsspam
[ssh] SSH attack
2019-07-01 05:53:45
218.73.117.19 attackspambots
SASL broute force
2019-07-01 05:40:21
187.108.79.176 attackbotsspam
SMTP-sasl brute force
...
2019-07-01 05:38:33
27.72.190.174 attackbots
3389BruteforceFW21
2019-07-01 05:41:17
89.178.175.30 attackbots
23/tcp
[2019-06-30]1pkt
2019-07-01 06:03:06
221.121.12.238 attackspambots
proto=tcp  .  spt=38834  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (746)
2019-07-01 05:17:40
68.14.135.194 attackbots
Many RDP login attempts detected by IDS script
2019-07-01 05:45:43
198.108.67.32 attack
firewall-block, port(s): 7788/tcp
2019-07-01 05:48:19
222.174.24.130 attack
445/tcp
[2019-06-30]1pkt
2019-07-01 05:58:14
118.243.117.67 attackbots
Unauthorized SSH login attempts
2019-07-01 05:25:23

Recently Reported IPs

246.95.159.23 124.247.43.33 206.65.105.172 165.36.34.195
49.200.43.2 34.170.181.184 132.61.239.208 172.152.14.25
150.139.38.223 88.96.134.65 138.66.8.41 122.109.224.171
245.231.166.90 130.26.146.166 215.52.35.90 60.184.18.199
239.207.132.255 134.212.126.254 120.167.33.13 4.218.71.85