Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: Vodafone Portugal - Communicacoes Pessoais S.A.

Hostname: unknown

Organization: Vodafone Portugal - Communicacoes Pessoais S.A.

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt from IP address 213.30.51.82 on Port 445(SMB)
2020-07-29 08:17:26
attackspambots
Unauthorized connection attempt from IP address 213.30.51.82 on Port 445(SMB)
2020-03-09 21:07:35
attackbots
SMB Server BruteForce Attack
2019-06-24 15:11:12
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.30.51.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24057
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.30.51.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 24 15:11:00 CST 2019
;; MSG SIZE  rcvd: 116
Host info
82.51.30.213.in-addr.arpa domain name pointer ns01.taag.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.51.30.213.in-addr.arpa	name = ns01.taag.pt.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
5.188.84.115 attack
0,28-02/04 [bc01/m11] PostRequest-Spammer scoring: zurich
2020-09-30 00:06:10
191.232.165.254 attack
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-30 00:14:32
119.149.136.46 attack
SSH brute-force attempt
2020-09-30 00:24:40
185.124.228.184 attackspambots
20/9/28@21:47:34: FAIL: Alarm-Network address from=185.124.228.184
...
2020-09-30 00:01:08
211.80.102.182 attackspambots
Sep 29 16:08:00 mail sshd[7868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.80.102.182 
Sep 29 16:08:01 mail sshd[7868]: Failed password for invalid user roel from 211.80.102.182 port 51833 ssh2
...
2020-09-30 00:40:23
212.129.144.231 attack
Invalid user teamspeak from 212.129.144.231 port 38056
2020-09-30 00:02:34
133.242.23.130 attack
Invalid user a from 133.242.23.130 port 33912
2020-09-30 00:23:01
61.187.92.45 attackbotsspam
Automatic report - Port Scan Attack
2020-09-30 00:38:20
171.8.135.136 attackbotsspam
Sep 29 18:20:32 serwer sshd\[4503\]: Invalid user list1 from 171.8.135.136 port 9797
Sep 29 18:20:32 serwer sshd\[4503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.135.136
Sep 29 18:20:34 serwer sshd\[4503\]: Failed password for invalid user list1 from 171.8.135.136 port 9797 ssh2
...
2020-09-30 00:20:44
187.108.31.94 attack
(smtpauth) Failed SMTP AUTH login from 187.108.31.94 (BR/Brazil/187.108.31.94-rev.tcheturbo.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-09-29 12:06:38 dovecot_login authenticator failed for (Alan) [187.108.31.94]:44872: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-29 12:16:40 dovecot_login authenticator failed for (Alan) [187.108.31.94]:44686: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-29 12:26:43 dovecot_login authenticator failed for (Alan) [187.108.31.94]:44870: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-29 12:36:45 dovecot_login authenticator failed for (Alan) [187.108.31.94]:44857: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-29 12:46:31 dovecot_login authenticator failed for (Alan) [187.108.31.94]:44920: 535 Incorrect authentication data (set_id=alanalonso)
2020-09-29 23:59:32
142.93.107.175 attack
Sep 30 01:43:36 web1 sshd[20970]: Invalid user customer from 142.93.107.175 port 35946
Sep 30 01:43:36 web1 sshd[20970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.107.175
Sep 30 01:43:36 web1 sshd[20970]: Invalid user customer from 142.93.107.175 port 35946
Sep 30 01:43:38 web1 sshd[20970]: Failed password for invalid user customer from 142.93.107.175 port 35946 ssh2
Sep 30 01:56:22 web1 sshd[25362]: Invalid user joanne from 142.93.107.175 port 45978
Sep 30 01:56:22 web1 sshd[25362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.107.175
Sep 30 01:56:22 web1 sshd[25362]: Invalid user joanne from 142.93.107.175 port 45978
Sep 30 01:56:24 web1 sshd[25362]: Failed password for invalid user joanne from 142.93.107.175 port 45978 ssh2
Sep 30 02:01:34 web1 sshd[27057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.107.175  user=root
Sep 30 02:01
...
2020-09-30 00:05:43
92.222.93.104 attackspambots
Multiple SSH login attempts.
2020-09-30 00:30:02
192.241.139.236 attackspambots
Fail2Ban Ban Triggered (2)
2020-09-30 00:39:02
188.163.113.36 attack
TCP Port Scanning
2020-09-30 00:34:41
218.103.131.32 attackbots
TCP Port Scanning
2020-09-30 00:27:48

Recently Reported IPs

115.6.133.7 101.0.93.194 25.166.153.74 10.186.89.38
56.4.56.104 48.205.240.9 65.216.255.52 59.78.93.105
180.119.128.194 243.234.133.223 16.235.94.218 24.115.42.32
71.165.246.51 219.182.223.200 185.80.37.194 163.145.50.21
122.193.7.45 36.117.44.204 178.26.9.23 77.247.110.197