Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shakhtinsk

Region: Karaganda

Country: Kazakhstan

Internet Service Provider: Kazakhtelecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.30.103.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.30.103.98.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020102700 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 27 17:48:36 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 98.103.30.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.103.30.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.130.241.74 attackbotsspam
Scan detected and blocked 2020.03.09 13:22:37
2020-03-10 04:37:09
203.109.106.165 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-03-10 04:59:42
213.74.69.141 attack
Port 1433 Scan
2020-03-10 04:59:22
91.245.203.143 attackspam
Scan detected and blocked 2020.03.09 13:22:37
2020-03-10 04:37:55
51.77.150.203 attackspam
Mar 10 00:14:01 hosting sshd[24961]: Invalid user 123aa from 51.77.150.203 port 34534
...
2020-03-10 05:15:40
167.193.14.194 attack
Scan detected and blocked 2020.03.09 13:22:37
2020-03-10 04:36:36
73.245.127.219 attackbotsspam
2323/tcp 23/tcp...
[2020-01-23/03-09]40pkt,2pt.(tcp)
2020-03-10 04:45:03
196.191.0.60 attackbots
Email rejected due to spam filtering
2020-03-10 04:45:51
14.168.75.206 attackspambots
Email rejected due to spam filtering
2020-03-10 04:44:47
117.15.169.130 attackbotsspam
Mar  9 22:11:04 srv01 sshd[11314]: Invalid user 1 from 117.15.169.130 port 46114
Mar  9 22:11:04 srv01 sshd[11314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.15.169.130
Mar  9 22:11:04 srv01 sshd[11314]: Invalid user 1 from 117.15.169.130 port 46114
Mar  9 22:11:05 srv01 sshd[11314]: Failed password for invalid user 1 from 117.15.169.130 port 46114 ssh2
Mar  9 22:13:32 srv01 sshd[11460]: Invalid user 123456789 from 117.15.169.130 port 36846
Mar  9 22:13:34 srv01 sshd[11460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.15.169.130
Mar  9 22:13:32 srv01 sshd[11460]: Invalid user 123456789 from 117.15.169.130 port 36846
Mar  9 22:13:36 srv01 sshd[11460]: Failed password for invalid user 123456789 from 117.15.169.130 port 36846 ssh2
...
2020-03-10 05:16:29
90.1.78.45 attackspam
Scan detected and blocked 2020.03.09 13:22:37
2020-03-10 04:41:30
51.83.42.185 attack
Mar  9 21:46:09 lnxded64 sshd[27894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.185
Mar  9 21:46:09 lnxded64 sshd[27894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.185
2020-03-10 04:48:41
183.80.13.239 attackbots
Mar  9 13:53:14 163-172-32-151 sshd[10850]: Invalid user guest from 183.80.13.239 port 61102
...
2020-03-10 04:46:40
91.112.216.35 attackbots
Scan detected and blocked 2020.03.09 13:22:37
2020-03-10 04:38:35
137.74.172.1 attack
DATE:2020-03-09 20:21:04, IP:137.74.172.1, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-10 04:42:57

Recently Reported IPs

60.168.129.33 196.247.57.116 112.196.29.147 199.231.83.7
51.103.80.119 174.254.71.16 93.179.105.13 51.143.130.33
13.68.183.171 153.222.143.71 157.149.169.87 105.168.247.78
187.108.44.228 187.108.44.87 113.119.199.80 219.136.205.10
14.145.136.106 15.237.137.200 13.115.148.170 123.191.162.83