Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '175.30.0.0 - 175.30.63.255'

% Abuse contact for '175.30.0.0 - 175.30.63.255' is '18943124057@189.cn'

inetnum:        175.30.0.0 - 175.30.63.255
netname:        CC-YIQITONGXIN
descr:          CHANGCHUN-YIQITONGXIN
country:        CN
admin-c:        YL1057-AP
tech-c:         YL1057-AP
abuse-c:        AC1933-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-CHINANET-JL
mnt-irt:        IRT-CHINANET-JL
last-modified:  2021-01-25T13:18:43Z
source:         APNIC

irt:            IRT-CHINANET-JL
address:        No.2136,Dong-Nan-Hu Road,Changchun,130000,Jilin
e-mail:         18943124057@189.cn
abuse-mailbox:  18943124057@189.cn
admin-c:        YL1057-AP
tech-c:         YL1057-AP
auth:           # Filtered
remarks:        18943124057@189.cn was validated on 2026-03-18
mnt-by:         MAINT-CHINANET-JL
last-modified:  2026-03-18T00:37:12Z
source:         APNIC

role:           ABUSE CHINANETJL
country:        ZZ
address:        No.2136,Dong-Nan-Hu Road,Changchun,130000,Jilin
phone:          +000000000
e-mail:         18943124057@189.cn
admin-c:        YL1057-AP
tech-c:         YL1057-AP
nic-hdl:        AC1933-AP
remarks:        Generated from irt object IRT-CHINANET-JL
remarks:        18943124057@189.cn was validated on 2026-03-18
abuse-mailbox:  18943124057@189.cn
mnt-by:         APNIC-ABUSE
last-modified:  2026-03-18T00:37:38Z
source:         APNIC

person:         YI LU
nic-hdl:        YL1057-AP
e-mail:         18943124057@189.cn
address:        No.2136,Southeast lake  Street,Changchun,130042,Jilin
phone:          +86-431-85880000
fax-no:         +86-431-5881234
country:        CN
mnt-by:         MAINT-CHINANET-JL
last-modified:  2019-11-13T03:31:49Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.30.48.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;175.30.48.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032701 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 03:00:14 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 164.48.30.175.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.48.30.175.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.217.58 attackspambots
Dec 15 20:26:21 wh01 sshd[1637]: Failed password for mail from 178.128.217.58 port 57544 ssh2
Dec 15 20:26:21 wh01 sshd[1637]: Received disconnect from 178.128.217.58 port 57544:11: Bye Bye [preauth]
Dec 15 20:26:21 wh01 sshd[1637]: Disconnected from 178.128.217.58 port 57544 [preauth]
Dec 15 20:33:55 wh01 sshd[2188]: Failed password for root from 178.128.217.58 port 55584 ssh2
Dec 15 20:33:56 wh01 sshd[2188]: Received disconnect from 178.128.217.58 port 55584:11: Bye Bye [preauth]
Dec 15 20:33:56 wh01 sshd[2188]: Disconnected from 178.128.217.58 port 55584 [preauth]
Dec 15 20:39:35 wh01 sshd[2766]: Invalid user admin from 178.128.217.58 port 34104
Dec 15 20:39:35 wh01 sshd[2766]: Failed password for invalid user admin from 178.128.217.58 port 34104 ssh2
Dec 15 20:39:35 wh01 sshd[2766]: Received disconnect from 178.128.217.58 port 34104:11: Bye Bye [preauth]
Dec 15 20:39:35 wh01 sshd[2766]: Disconnected from 178.128.217.58 port 34104 [preauth]
Dec 15 21:01:58 wh01 sshd[4754]: Failed pa
2019-12-16 04:31:22
47.17.177.110 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-16 04:17:45
106.75.10.4 attack
Dec 15 10:47:07 linuxvps sshd\[31111\]: Invalid user docker from 106.75.10.4
Dec 15 10:47:07 linuxvps sshd\[31111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.10.4
Dec 15 10:47:10 linuxvps sshd\[31111\]: Failed password for invalid user docker from 106.75.10.4 port 40901 ssh2
Dec 15 10:54:34 linuxvps sshd\[36101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.10.4  user=ftp
Dec 15 10:54:36 linuxvps sshd\[36101\]: Failed password for ftp from 106.75.10.4 port 38068 ssh2
2019-12-16 04:00:18
189.165.26.13 attack
Telnet/23 MH Probe, BF, Hack -
2019-12-16 04:24:05
45.180.73.11 attackspam
Automatic report - Banned IP Access
2019-12-16 04:32:28
223.100.172.157 attackbots
Dec 15 15:29:54 icinga sshd[64870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.172.157 
Dec 15 15:29:56 icinga sshd[64870]: Failed password for invalid user web from 223.100.172.157 port 39850 ssh2
Dec 15 15:48:18 icinga sshd[16482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.172.157 
...
2019-12-16 04:15:15
159.203.12.249 attack
spamming login attempts from exploited Digital Ocean Host. Blocked by HACKER BLOCKER!
2019-12-16 04:20:02
138.197.176.130 attack
Dec 15 20:26:54 minden010 sshd[31047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.176.130
Dec 15 20:26:56 minden010 sshd[31047]: Failed password for invalid user ftp from 138.197.176.130 port 33041 ssh2
Dec 15 20:33:32 minden010 sshd[716]: Failed password for root from 138.197.176.130 port 36528 ssh2
...
2019-12-16 04:07:46
51.83.98.104 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-16 04:03:47
185.175.93.105 attack
Fail2Ban Ban Triggered
2019-12-16 03:58:57
165.22.61.82 attackbots
Dec 15 11:50:46 ny01 sshd[32428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82
Dec 15 11:50:48 ny01 sshd[32428]: Failed password for invalid user mysql from 165.22.61.82 port 57764 ssh2
Dec 15 11:57:08 ny01 sshd[955]: Failed password for backup from 165.22.61.82 port 36586 ssh2
2019-12-16 04:12:35
14.243.44.42 attack
1576421290 - 12/15/2019 15:48:10 Host: 14.243.44.42/14.243.44.42 Port: 445 TCP Blocked
2019-12-16 04:23:17
159.203.74.227 attackbotsspam
Dec 15 20:35:18 server sshd\[9967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227  user=root
Dec 15 20:35:20 server sshd\[9967\]: Failed password for root from 159.203.74.227 port 45836 ssh2
Dec 15 20:46:23 server sshd\[13764\]: Invalid user sliva from 159.203.74.227
Dec 15 20:46:23 server sshd\[13764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.74.227 
Dec 15 20:46:25 server sshd\[13764\]: Failed password for invalid user sliva from 159.203.74.227 port 33864 ssh2
...
2019-12-16 03:55:24
1.203.115.141 attackbotsspam
21 attempts against mh-ssh on cloud.magehost.pro
2019-12-16 04:26:05
98.143.146.166 attackspambots
(imapd) Failed IMAP login from 98.143.146.166 (US/United States/98.143.146.166.static.quadranet.com): 1 in the last 3600 secs
2019-12-16 04:11:38

Recently Reported IPs

114.97.190.159 124.165.145.80 2606:4700:10::6814:6121 2606:4700:10::6814:6475
121.234.219.179 2606:4700:10::6814:6787 2606:4700:10::6814:9151 2606:4700:10::ac43:121e
2606:4700:10::6816:2120 2606:4700:10::6816:2994 2606:4700:10::6814:9013 2606:4700:10::6814:4784
2606:4700:10::6814:4737 15.207.113.178 178.20.210.180 2606:4700:10::6816:2992
110.78.158.241 2606:4700:10::6814:4741 2606:4700:10::6814:9834 2606:4700:10::6814:8950