Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.49.30.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.49.30.52.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 22:51:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
52.30.49.197.in-addr.arpa domain name pointer host-197.49.30.52.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.30.49.197.in-addr.arpa	name = host-197.49.30.52.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.2.74.53 attackbotsspam
slow and persistent scanner
2020-07-27 05:50:43
222.186.175.217 attackspam
Fail2Ban
2020-07-27 06:06:20
89.205.126.146 attackbotsspam
Icarus honeypot on github
2020-07-27 06:00:15
114.233.40.61 attackbots
1595794503 - 07/27/2020 03:15:03 Host: 114.233.40.61/114.233.40.61 Port: 23 TCP Blocked
...
2020-07-27 05:46:46
106.13.4.132 attackbots
Jul 27 00:16:29 ift sshd\[63144\]: Invalid user jht from 106.13.4.132Jul 27 00:16:30 ift sshd\[63144\]: Failed password for invalid user jht from 106.13.4.132 port 50306 ssh2Jul 27 00:17:58 ift sshd\[63345\]: Invalid user tommy from 106.13.4.132Jul 27 00:18:00 ift sshd\[63345\]: Failed password for invalid user tommy from 106.13.4.132 port 45054 ssh2Jul 27 00:19:31 ift sshd\[63409\]: Invalid user guest1 from 106.13.4.132
...
2020-07-27 05:37:04
213.212.63.61 attackspam
Port probing on unauthorized port 445
2020-07-27 05:49:46
178.242.25.24 attackspambots
Automatic report - Banned IP Access
2020-07-27 05:55:36
37.235.17.233 attackspam
(smtpauth) Failed SMTP AUTH login from 37.235.17.233 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-27 00:44:40 plain authenticator failed for ([37.235.17.233]) [37.235.17.233]: 535 Incorrect authentication data (set_id=info)
2020-07-27 05:59:11
179.83.40.218 attack
Automatic report - Port Scan Attack
2020-07-27 05:38:41
167.71.91.205 attackspam
SSH Invalid Login
2020-07-27 05:56:18
192.168.1.47 attack
P2P attacker
2020-07-27 05:57:46
139.170.150.189 attackspam
Invalid user james from 139.170.150.189 port 35763
2020-07-27 05:50:23
201.46.18.222 attackspambots
WordPress brute force
2020-07-27 05:37:58
42.123.99.67 attackspam
Invalid user info from 42.123.99.67 port 51740
2020-07-27 05:42:35
183.219.101.110 attackspambots
Dovecot Invalid User Login Attempt.
2020-07-27 06:05:15

Recently Reported IPs

121.7.127.18 118.169.131.152 212.119.40.56 188.17.152.126
122.160.156.127 121.205.212.128 45.90.63.208 114.246.35.4
77.75.78.167 103.18.77.236 178.72.75.156 154.84.133.5
45.7.177.230 61.7.154.250 187.114.177.229 45.117.157.111
187.147.185.96 27.112.121.49 109.233.21.86 51.253.36.151