Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.248.30.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.248.30.0.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081900 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 19 20:39:24 CST 2024
;; MSG SIZE  rcvd: 105
Host info
Host 0.30.248.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.30.248.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.216.140.252 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-28 18:10:38
144.217.234.174 attackspam
2019-10-28T09:52:54.653065abusebot-4.cloudsearch.cf sshd\[20708\]: Invalid user idc from 144.217.234.174 port 40221
2019-10-28 18:19:16
3.19.28.165 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-10-28 18:28:26
45.125.65.99 attackbotsspam
\[2019-10-28 06:35:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-28T06:35:43.413-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900748556213011",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/54262",ACLName="no_extension_match"
\[2019-10-28 06:35:48\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-28T06:35:48.712-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900248556213011",SessionID="0x7fdf2c144d18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/59601",ACLName="no_extension_match"
\[2019-10-28 06:35:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-28T06:35:57.424-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00848556213011",SessionID="0x7fdf2c567918",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/52560",ACLName="no_extensi
2019-10-28 18:37:13
42.51.156.6 attack
Oct 28 05:48:56 bouncer sshd\[5557\]: Invalid user com123 from 42.51.156.6 port 54883
Oct 28 05:48:57 bouncer sshd\[5557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.156.6 
Oct 28 05:48:59 bouncer sshd\[5557\]: Failed password for invalid user com123 from 42.51.156.6 port 54883 ssh2
...
2019-10-28 18:22:16
170.106.67.243 attack
Fail2Ban Ban Triggered
2019-10-28 18:29:38
27.84.166.140 attackbots
Oct 28 16:27:27 itv-usvr-01 sshd[26202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.84.166.140  user=root
Oct 28 16:27:30 itv-usvr-01 sshd[26202]: Failed password for root from 27.84.166.140 port 52136 ssh2
Oct 28 16:31:18 itv-usvr-01 sshd[26359]: Invalid user marilia from 27.84.166.140
Oct 28 16:31:18 itv-usvr-01 sshd[26359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.84.166.140
Oct 28 16:31:18 itv-usvr-01 sshd[26359]: Invalid user marilia from 27.84.166.140
Oct 28 16:31:20 itv-usvr-01 sshd[26359]: Failed password for invalid user marilia from 27.84.166.140 port 33168 ssh2
2019-10-28 18:24:33
222.186.175.154 attackbots
Oct 28 06:39:04 ny01 sshd[19142]: Failed password for root from 222.186.175.154 port 8272 ssh2
Oct 28 06:39:20 ny01 sshd[19142]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 8272 ssh2 [preauth]
Oct 28 06:39:31 ny01 sshd[19176]: Failed password for root from 222.186.175.154 port 12386 ssh2
2019-10-28 18:45:09
50.239.143.195 attackbotsspam
2019-10-05T11:31:45.349313ns525875 sshd\[6014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195  user=root
2019-10-05T11:31:47.836273ns525875 sshd\[6014\]: Failed password for root from 50.239.143.195 port 42118 ssh2
2019-10-05T11:35:23.777536ns525875 sshd\[10374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195  user=root
2019-10-05T11:35:26.193884ns525875 sshd\[10374\]: Failed password for root from 50.239.143.195 port 53546 ssh2
2019-10-05T11:39:01.517457ns525875 sshd\[14720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195  user=root
2019-10-05T11:39:03.526643ns525875 sshd\[14720\]: Failed password for root from 50.239.143.195 port 36738 ssh2
2019-10-05T11:42:44.866125ns525875 sshd\[19241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.195  user=root
2
...
2019-10-28 18:11:20
183.109.79.253 attack
$f2bV_matches
2019-10-28 18:38:26
59.25.197.142 attackspambots
Oct 28 10:07:59 [host] sshd[14237]: Invalid user jake from 59.25.197.142
Oct 28 10:07:59 [host] sshd[14237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.142
Oct 28 10:08:01 [host] sshd[14237]: Failed password for invalid user jake from 59.25.197.142 port 45074 ssh2
2019-10-28 18:35:04
182.106.217.138 attack
Oct 28 03:29:21 plusreed sshd[19105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.106.217.138  user=root
Oct 28 03:29:23 plusreed sshd[19105]: Failed password for root from 182.106.217.138 port 41562 ssh2
...
2019-10-28 18:33:02
138.117.162.86 attack
Oct 28 08:26:28 localhost sshd\[36059\]: Invalid user jm from 138.117.162.86 port 52375
Oct 28 08:26:28 localhost sshd\[36059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.162.86
Oct 28 08:26:30 localhost sshd\[36059\]: Failed password for invalid user jm from 138.117.162.86 port 52375 ssh2
Oct 28 08:32:52 localhost sshd\[36213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.162.86  user=root
Oct 28 08:32:55 localhost sshd\[36213\]: Failed password for root from 138.117.162.86 port 44311 ssh2
...
2019-10-28 18:27:23
45.136.110.47 attack
firewall-block, port(s): 6839/tcp, 6886/tcp, 6918/tcp, 6934/tcp, 7005/tcp, 7175/tcp, 7229/tcp, 7271/tcp, 7310/tcp, 7436/tcp, 7526/tcp, 7712/tcp, 7728/tcp, 7741/tcp, 7778/tcp, 7782/tcp, 7800/tcp, 7826/tcp, 8035/tcp, 8154/tcp
2019-10-28 18:21:20
82.118.242.128 attackbotsspam
ssh brute force
2019-10-28 18:08:27

Recently Reported IPs

135.135.129.79 72.33.0.61 174.200.167.248 104.28.103.17
49.7.133.110 8.211.39.215 10.172.236.150 85.61.47.27
70.185.124.108 173.82.226.108 35.55.123.94 47.96.82.196
82.157.107.7 155.159.124.178 142.232.52.162 13.91.182.218
91.149.255.106 194.87.196.227 193.124.46.92 91.149.202.91