Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.51.99.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.51.99.30.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:25:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 30.99.51.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.99.51.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.129.33.24 attack
Port scan on 10 port(s): 21611 21619 21695 21720 21721 21734 21737 21745 21764 21768
2020-08-05 08:19:15
123.207.111.151 attackbots
Aug  4 22:09:27 abendstille sshd\[9350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.111.151  user=root
Aug  4 22:09:29 abendstille sshd\[9350\]: Failed password for root from 123.207.111.151 port 51370 ssh2
Aug  4 22:11:34 abendstille sshd\[12758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.111.151  user=root
Aug  4 22:11:37 abendstille sshd\[12758\]: Failed password for root from 123.207.111.151 port 55528 ssh2
Aug  4 22:13:46 abendstille sshd\[14796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.111.151  user=root
...
2020-08-05 08:27:07
152.136.114.118 attackspam
Aug  4 20:31:45 vps333114 sshd[28795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.114.118  user=root
Aug  4 20:31:47 vps333114 sshd[28795]: Failed password for root from 152.136.114.118 port 60874 ssh2
...
2020-08-05 08:22:01
167.71.209.115 attackbots
Automatic report - XMLRPC Attack
2020-08-05 08:01:44
180.76.173.75 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-05 08:03:02
203.3.84.204 attackbotsspam
Aug  1 23:39:08 prox sshd[15943]: Failed password for root from 203.3.84.204 port 36131 ssh2
2020-08-05 07:58:39
193.27.229.116 attack
Brute forcing RDP port 3389
2020-08-05 08:15:21
109.21.212.151 attack
Sniffing for wp-login
2020-08-05 08:18:16
213.168.248.26 attack
Automatic report - Banned IP Access
2020-08-05 08:30:21
133.242.155.85 attack
2020-08-04T23:03:12.510522abusebot-8.cloudsearch.cf sshd[5501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-08-04T23:03:14.663369abusebot-8.cloudsearch.cf sshd[5501]: Failed password for root from 133.242.155.85 port 48242 ssh2
2020-08-04T23:05:52.975238abusebot-8.cloudsearch.cf sshd[5515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-08-04T23:05:54.757346abusebot-8.cloudsearch.cf sshd[5515]: Failed password for root from 133.242.155.85 port 34752 ssh2
2020-08-04T23:08:19.940628abusebot-8.cloudsearch.cf sshd[5545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.fm-net.ne.jp  user=root
2020-08-04T23:08:22.238754abusebot-8.cloudsearch.cf sshd[5545]: Failed password for root from 133.242.155.85 port 49426 ssh2
2020-08-04T23:10:48.230208abusebot-8.cloudsearch.cf sshd[5784]: pam_unix(sshd:auth): 
...
2020-08-05 08:03:26
193.27.229.112 attackspam
Brute forcing RDP port 3389
2020-08-05 08:20:42
46.146.136.8 attack
Aug  4 20:44:21 sip sshd[1191220]: Failed password for root from 46.146.136.8 port 53800 ssh2
Aug  4 20:48:32 sip sshd[1191235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.136.8  user=root
Aug  4 20:48:34 sip sshd[1191235]: Failed password for root from 46.146.136.8 port 36470 ssh2
...
2020-08-05 08:18:44
59.9.199.98 attackbots
Aug  5 02:04:37 vm0 sshd[4738]: Failed password for root from 59.9.199.98 port 62551 ssh2
...
2020-08-05 08:29:50
125.227.236.60 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-05 08:19:50
63.143.55.83 attack
From elisa.rosa@lifesulplanosdesaude.com.br Tue Aug 04 14:53:06 2020
Received: from emkt.sarah.lifesulplanosdesaude.com.br ([63.143.55.83]:34102)
2020-08-05 08:24:14

Recently Reported IPs

44.212.214.112 92.61.209.30 107.32.15.225 196.88.174.74
194.165.93.179 144.193.29.128 159.223.3.13 139.36.107.112
23.14.42.179 202.206.139.117 208.3.146.198 42.33.78.112
47.146.214.131 35.247.25.160 254.135.175.110 84.178.36.13
77.16.124.44 122.120.215.171 220.128.235.63 185.52.204.123