Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.30.123.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.30.123.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 19:17:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 241.123.30.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.123.30.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
73.29.110.75 spam
Tried to hack my FB,  stop it
2019-11-12 05:57:29
185.50.198.121 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-12 06:14:26
194.184.98.141 attackspam
mail auth brute force
2019-11-12 05:47:29
106.13.56.12 attackbots
$f2bV_matches
2019-11-12 05:44:03
125.162.91.157 attackbotsspam
" "
2019-11-12 06:16:39
106.13.204.251 attackbots
$f2bV_matches
2019-11-12 05:53:00
190.145.39.36 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-12 05:42:15
130.180.66.98 attack
2019-11-10 06:56:55 server sshd[62517]: Failed password for invalid user root from 130.180.66.98 port 58918 ssh2
2019-11-12 05:50:27
82.162.48.41 attackspam
mail auth brute force
2019-11-12 05:49:02
217.112.128.199 attackbots
Postfix DNSBL listed. Trying to send SPAM.
2019-11-12 06:01:59
190.48.89.210 attackspambots
Honeypot attack, port: 23, PTR: 190-48-89-210.speedy.com.ar.
2019-11-12 05:52:11
159.203.201.47 attack
11/11/2019-15:36:26.252399 159.203.201.47 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-11-12 05:37:59
109.108.229.79 attackspam
Honeypot attack, port: 23, PTR: cpe-109-108-229-79.enet.vn.ua.
2019-11-12 05:38:45
52.187.131.27 attack
Nov 11 21:09:09 srv1 sshd[24407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.131.27
Nov 11 21:09:11 srv1 sshd[24407]: Failed password for invalid user alikhan from 52.187.131.27 port 57818 ssh2
...
2019-11-12 05:55:03
93.157.189.246 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-12 06:07:46

Recently Reported IPs

220.22.48.79 14.47.205.0 197.241.141.44 38.53.103.91
182.192.204.127 244.222.175.181 68.94.193.252 30.83.199.230
177.43.53.89 248.197.156.240 43.148.162.132 191.172.205.170
229.36.82.225 162.242.20.226 68.141.227.111 90.60.27.41
231.144.47.222 45.206.168.187 64.203.145.55 77.76.99.213