Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.142.138.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32494
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;221.142.138.30.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060501 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 11:37:14 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 30.138.142.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 30.138.142.221.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
124.239.218.188 attackbots
Invalid user mk from 124.239.218.188 port 58311
2020-04-21 06:18:21
80.232.246.116 attackspam
Apr 20 15:01:59 : SSH login attempts with invalid user
2020-04-21 06:40:36
219.74.191.92 attackbotsspam
Port probing on unauthorized port 23
2020-04-21 06:35:03
122.51.230.216 attackbots
(pop3d) Failed POP3 login from 122.51.230.216 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 21 00:25:00 ir1 dovecot[566034]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=122.51.230.216, lip=5.63.12.44, session=
2020-04-21 06:37:41
36.92.174.133 attack
Invalid user sp from 36.92.174.133 port 49417
2020-04-21 06:15:56
84.108.25.20 attack
400 BAD REQUEST
2020-04-21 06:33:43
104.236.125.98 attack
*Port Scan* detected from 104.236.125.98 (US/United States/New Jersey/Clifton/-). 4 hits in the last 136 seconds
2020-04-21 06:40:11
148.70.157.213 attackbots
Apr 20 21:55:08 ArkNodeAT sshd\[16945\]: Invalid user ou from 148.70.157.213
Apr 20 21:55:08 ArkNodeAT sshd\[16945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.157.213
Apr 20 21:55:10 ArkNodeAT sshd\[16945\]: Failed password for invalid user ou from 148.70.157.213 port 47010 ssh2
2020-04-21 06:17:56
49.232.168.32 attackspam
Apr 20 14:40:36: Invalid user sf from 49.232.168.32 port 48104
2020-04-21 06:14:53
124.158.183.18 attackbots
Invalid user fv from 124.158.183.18 port 35566
2020-04-21 06:28:42
75.130.124.90 attackspam
5x Failed Password
2020-04-21 06:13:48
176.32.34.226 attack
Apr 20 22:34:39 debian-2gb-nbg1-2 kernel: \[9673840.558847\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.32.34.226 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=53 ID=29743 DF PROTO=UDP SPT=52015 DPT=11211 LEN=24
2020-04-21 06:15:44
104.248.164.123 attack
ssh brute force
2020-04-21 06:42:02
185.176.27.98 attackbotsspam
04/20/2020-17:18:59.112573 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-04-21 06:33:00
89.137.249.74 attack
Automatic report - Port Scan Attack
2020-04-21 06:44:37

Recently Reported IPs

61.166.49.101 111.38.25.114 113.160.251.60 46.219.99.78
190.10.8.50 220.135.210.219 192.42.116.22 223.68.8.162
128.199.154.237 182.40.147.16 179.25.146.58 4.194.218.154
102.60.0.213 85.111.159.50 185.222.202.245 255.240.52.2
174.147.234.2 114.67.232.245 190.100.179.35 233.57.19.97