Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cambridge

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.30.2.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.30.2.245.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060100 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 01 22:02:58 CST 2024
;; MSG SIZE  rcvd: 104
Host info
245.2.30.18.in-addr.arpa domain name pointer dhcp-18-30-2-245.dyn.mit.edu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.2.30.18.in-addr.arpa	name = dhcp-18-30-2-245.dyn.mit.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.119.153.110 attack
Invalid user db2fenc1 from 1.119.153.110 port 34802
2020-09-30 05:52:34
119.29.195.187 attackspam
Sep 29 17:27:11 melroy-server sshd[17444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.195.187 
Sep 29 17:27:13 melroy-server sshd[17444]: Failed password for invalid user admin from 119.29.195.187 port 43502 ssh2
...
2020-09-30 05:55:52
206.189.38.105 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-30 05:57:28
151.236.193.195 attackbots
Sep 29 22:37:58 rocket sshd[27760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.193.195
Sep 29 22:38:01 rocket sshd[27760]: Failed password for invalid user japan from 151.236.193.195 port 27402 ssh2
Sep 29 22:42:25 rocket sshd[28441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.236.193.195
...
2020-09-30 05:54:36
91.134.142.57 attackbotsspam
91.134.142.57 - - [29/Sep/2020:22:58:19 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.134.142.57 - - [29/Sep/2020:22:58:21 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.134.142.57 - - [29/Sep/2020:22:58:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-30 06:18:22
77.68.20.140 attack
SSH Invalid Login
2020-09-30 05:59:00
103.137.36.254 attack
port scan and connect, tcp 80 (http)
2020-09-30 06:03:49
112.85.42.67 attackspambots
Sep 29 23:52:10 mail sshd[31436]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:53:03 mail sshd[31474]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:53:55 mail sshd[31497]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:54:51 mail sshd[31568]: refused connect from 112.85.42.67 (112.85.42.67)
Sep 29 23:55:43 mail sshd[31605]: refused connect from 112.85.42.67 (112.85.42.67)
...
2020-09-30 06:15:40
138.68.5.192 attackbots
Sep 29 23:51:07 OPSO sshd\[16054\]: Invalid user lisa from 138.68.5.192 port 46326
Sep 29 23:51:07 OPSO sshd\[16054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.5.192
Sep 29 23:51:08 OPSO sshd\[16054\]: Failed password for invalid user lisa from 138.68.5.192 port 46326 ssh2
Sep 29 23:57:34 OPSO sshd\[17091\]: Invalid user pgsql1 from 138.68.5.192 port 36564
Sep 29 23:57:34 OPSO sshd\[17091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.5.192
2020-09-30 06:09:22
103.153.97.43 attackspam
Port Scan
...
2020-09-30 06:09:56
157.245.240.102 attack
uvcm 157.245.240.102 [29/Sep/2020:03:45:40 "-" "POST /wp-login.php 200 6728
157.245.240.102 [29/Sep/2020:03:45:42 "-" "GET /wp-login.php 200 6619
157.245.240.102 [29/Sep/2020:03:45:43 "-" "POST /wp-login.php 200 6726
2020-09-30 06:11:27
185.234.216.66 attack
abuse-sasl
2020-09-30 06:09:01
78.128.113.121 attackspambots
Sep 29 23:31:36 srv01 postfix/smtpd\[12509\]: warning: unknown\[78.128.113.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 23:31:54 srv01 postfix/smtpd\[12495\]: warning: unknown\[78.128.113.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 23:32:49 srv01 postfix/smtpd\[12495\]: warning: unknown\[78.128.113.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 23:33:09 srv01 postfix/smtpd\[5044\]: warning: unknown\[78.128.113.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 23:46:26 srv01 postfix/smtpd\[18933\]: warning: unknown\[78.128.113.121\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-30 05:56:26
139.155.49.239 attackbots
Time:     Tue Sep 29 17:06:25 2020 00
IP:       139.155.49.239 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 29 16:37:19 -11 sshd[28397]: Invalid user zope from 139.155.49.239 port 36722
Sep 29 16:37:21 -11 sshd[28397]: Failed password for invalid user zope from 139.155.49.239 port 36722 ssh2
Sep 29 17:02:47 -11 sshd[29168]: Invalid user sysadmin from 139.155.49.239 port 38318
Sep 29 17:02:49 -11 sshd[29168]: Failed password for invalid user sysadmin from 139.155.49.239 port 38318 ssh2
Sep 29 17:06:24 -11 sshd[29300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.49.239  user=root
2020-09-30 05:53:02
80.194.5.129 attack
Automatic report - Port Scan Attack
2020-09-30 05:50:14

Recently Reported IPs

214.86.129.149 80.161.163.135 178.6.91.14 2.95.249.98
20.235.50.149 250.75.254.176 81.156.70.64 93.255.188.221
161.68.126.9 79.224.220.128 169.182.161.24 230.60.52.201
235.141.168.41 47.68.151.254 15.230.253.84 178.143.245.76
245.242.204.56 173.74.141.94 33.55.187.175 54.231.255.225