Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Surrey

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.30.113.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.30.113.54.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 29 12:31:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 54.113.30.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.113.30.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
71.62.129.30 attackbots
Mar 21 19:38:44 vpn01 sshd[15844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.62.129.30
Mar 21 19:38:46 vpn01 sshd[15844]: Failed password for invalid user uy from 71.62.129.30 port 33854 ssh2
...
2020-03-22 04:56:44
94.191.84.38 attackbotsspam
Mar 21 20:24:43 jane sshd[19806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.84.38 
Mar 21 20:24:45 jane sshd[19806]: Failed password for invalid user admin from 94.191.84.38 port 55670 ssh2
...
2020-03-22 04:51:39
60.250.164.169 attackbots
Mar 21 17:37:31 firewall sshd[25878]: Failed password for invalid user ashton from 60.250.164.169 port 45678 ssh2
Mar 21 17:41:47 firewall sshd[26136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.164.169  user=mail
Mar 21 17:41:49 firewall sshd[26136]: Failed password for mail from 60.250.164.169 port 35450 ssh2
...
2020-03-22 05:00:32
94.102.49.82 attack
Invalid user admin from 94.102.49.82 port 62568
2020-03-22 04:52:23
46.39.178.146 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-22 05:08:57
62.171.154.107 attack
Mar 21 21:05:52 h1745522 sshd[1466]: Invalid user tm from 62.171.154.107 port 48242
Mar 21 21:05:52 h1745522 sshd[1466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.171.154.107
Mar 21 21:05:52 h1745522 sshd[1466]: Invalid user tm from 62.171.154.107 port 48242
Mar 21 21:05:55 h1745522 sshd[1466]: Failed password for invalid user tm from 62.171.154.107 port 48242 ssh2
Mar 21 21:09:48 h1745522 sshd[1845]: Invalid user informix from 62.171.154.107 port 61104
Mar 21 21:09:48 h1745522 sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.171.154.107
Mar 21 21:09:48 h1745522 sshd[1845]: Invalid user informix from 62.171.154.107 port 61104
Mar 21 21:09:50 h1745522 sshd[1845]: Failed password for invalid user informix from 62.171.154.107 port 61104 ssh2
Mar 21 21:13:54 h1745522 sshd[2199]: Invalid user od from 62.171.154.107 port 9448
...
2020-03-22 04:58:50
113.207.83.130 attack
Invalid user ofbiz from 113.207.83.130 port 52190
2020-03-22 04:41:28
104.41.167.130 attackbotsspam
Invalid user yueyimin from 104.41.167.130 port 40382
2020-03-22 04:47:39
62.234.206.12 attackbots
Mar 21 23:50:21 areeb-Workstation sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.206.12 
Mar 21 23:50:23 areeb-Workstation sshd[20856]: Failed password for invalid user candida from 62.234.206.12 port 43980 ssh2
...
2020-03-22 04:58:19
103.129.223.22 attack
Mar 21 17:45:41 sshgateway sshd\[18533\]: Invalid user test from 103.129.223.22
Mar 21 17:45:41 sshgateway sshd\[18533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.22
Mar 21 17:45:43 sshgateway sshd\[18533\]: Failed password for invalid user test from 103.129.223.22 port 52750 ssh2
2020-03-22 04:48:06
106.51.98.159 attackbotsspam
Mar 22 04:10:53 webhost01 sshd[2150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.98.159
Mar 22 04:10:55 webhost01 sshd[2150]: Failed password for invalid user wh from 106.51.98.159 port 37998 ssh2
...
2020-03-22 05:17:40
14.29.165.173 attackbotsspam
Mar 21 21:11:00 cdc sshd[23921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.165.173 
Mar 21 21:11:02 cdc sshd[23921]: Failed password for invalid user tom from 14.29.165.173 port 41717 ssh2
2020-03-22 05:12:17
218.72.74.95 attackbotsspam
FTP brute-force attack
2020-03-22 05:12:45
82.223.68.107 attack
Invalid user tomcat from 82.223.68.107 port 57772
2020-03-22 04:55:11
54.37.224.163 attackbotsspam
Mar 21 21:53:43 ourumov-web sshd\[21244\]: Invalid user am from 54.37.224.163 port 50924
Mar 21 21:53:43 ourumov-web sshd\[21244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.224.163
Mar 21 21:53:45 ourumov-web sshd\[21244\]: Failed password for invalid user am from 54.37.224.163 port 50924 ssh2
...
2020-03-22 05:01:46

Recently Reported IPs

190.38.173.137 160.74.169.72 237.63.148.18 167.208.13.28
211.12.222.8 166.100.228.22 176.81.74.120 238.239.193.230
108.220.30.217 24.130.15.105 37.83.8.23 40.43.60.167
124.205.83.114 174.138.21.241 85.206.69.133 13.52.255.242
41.246.28.20 244.104.139.37 251.6.81.63 236.31.5.60