Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.12.30.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.12.30.163.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:19:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 163.30.12.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 214.12.30.163.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
88.249.64.9 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 20:04:05
180.117.112.42 attack
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:59 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:59 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
Jul 11 17:43:01 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
2019-07-11 19:18:32
181.64.237.178 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 19:53:28
88.88.193.230 attack
Jul 11 13:29:33 cvbmail sshd\[8924\]: Invalid user snoopy from 88.88.193.230
Jul 11 13:29:33 cvbmail sshd\[8924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.88.193.230
Jul 11 13:29:34 cvbmail sshd\[8924\]: Failed password for invalid user snoopy from 88.88.193.230 port 58167 ssh2
2019-07-11 19:45:24
1.179.246.56 attackspam
Invalid user admin1 from 1.179.246.56 port 36016
2019-07-11 20:03:14
1.175.222.90 attackbots
445/tcp
[2019-07-11]1pkt
2019-07-11 20:08:48
103.79.141.146 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-11 20:04:55
60.174.39.82 attackbotsspam
$f2bV_matches
2019-07-11 19:46:51
114.43.89.18 attack
37215/tcp
[2019-07-11]1pkt
2019-07-11 19:44:49
118.193.31.181 attack
Honeypot hit.
2019-07-11 19:25:50
27.50.62.78 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 19:30:39
199.195.251.37 attack
scan r
2019-07-11 19:43:11
147.91.199.150 attackspambots
8080/tcp
[2019-07-11]1pkt
2019-07-11 20:07:01
185.210.36.134 attack
ssh failed login
2019-07-11 19:49:12
179.232.1.254 attackbotsspam
$f2bV_matches
2019-07-11 19:20:57

Recently Reported IPs

117.242.165.221 86.82.178.85 177.240.91.236 42.170.135.184
68.42.11.160 8.26.109.85 28.54.145.8 173.26.74.57
181.178.43.128 208.226.164.4 217.210.16.34 219.149.154.80
181.53.110.130 38.53.95.29 143.158.101.78 104.24.168.173
107.136.141.210 19.108.174.160 156.247.155.112 29.105.49.16