Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Xinjiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.80.138.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;222.80.138.30.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121301 1800 900 604800 86400

;; Query time: 233 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 04:32:50 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 30.138.80.222.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.138.80.222.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.132.77.123 attackbotsspam
Sep 17 14:01:33 logopedia-1vcpu-1gb-nyc1-01 sshd[377205]: Failed password for root from 79.132.77.123 port 46146 ssh2
...
2020-09-18 13:21:47
115.186.188.53 attack
Sep 17 20:09:47 plg sshd[17371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.188.53 
Sep 17 20:09:49 plg sshd[17371]: Failed password for invalid user administrator from 115.186.188.53 port 46224 ssh2
Sep 17 20:12:03 plg sshd[17395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.188.53 
Sep 17 20:12:05 plg sshd[17395]: Failed password for invalid user cocoa1 from 115.186.188.53 port 36990 ssh2
Sep 17 20:14:23 plg sshd[17409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.188.53 
Sep 17 20:14:25 plg sshd[17409]: Failed password for invalid user layout1 from 115.186.188.53 port 55992 ssh2
Sep 17 20:16:44 plg sshd[17428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.188.53 
...
2020-09-18 13:10:04
222.253.253.138 attack
Unauthorized connection attempt from IP address 222.253.253.138 on Port 445(SMB)
2020-09-18 13:29:12
125.26.228.52 attack
1600362100 - 09/17/2020 19:01:40 Host: 125.26.228.52/125.26.228.52 Port: 445 TCP Blocked
2020-09-18 13:10:59
2804:14c:3b85:ccc:498b:1700:592d:9015 attackbotsspam
Attempting to access Wordpress login on a honeypot or private system.
2020-09-18 13:01:15
190.217.14.179 attackspambots
Unauthorized connection attempt from IP address 190.217.14.179 on Port 445(SMB)
2020-09-18 13:23:20
220.117.160.182 attackspam
2020-09-17T18:14:51.375727suse-nuc sshd[4544]: User root from 220.117.160.182 not allowed because listed in DenyUsers
...
2020-09-18 13:30:26
179.32.131.97 attackspambots
Unauthorized connection attempt from IP address 179.32.131.97 on Port 445(SMB)
2020-09-18 13:03:27
218.149.178.64 attackbotsspam
Sep 17 17:07:20 roki-contabo sshd\[11450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.178.64  user=root
Sep 17 17:07:22 roki-contabo sshd\[11450\]: Failed password for root from 218.149.178.64 port 55346 ssh2
Sep 17 19:01:47 roki-contabo sshd\[15263\]: Invalid user guest from 218.149.178.64
Sep 17 19:01:48 roki-contabo sshd\[15263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.149.178.64
Sep 17 19:01:49 roki-contabo sshd\[15263\]: Failed password for invalid user guest from 218.149.178.64 port 51042 ssh2
...
2020-09-18 13:02:26
85.229.186.252 attackbotsspam
Brute-force attempt banned
2020-09-18 13:29:56
79.143.44.122 attack
Sep 18 02:54:02 srv-ubuntu-dev3 sshd[64106]: Invalid user mts from 79.143.44.122
Sep 18 02:54:02 srv-ubuntu-dev3 sshd[64106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122
Sep 18 02:54:02 srv-ubuntu-dev3 sshd[64106]: Invalid user mts from 79.143.44.122
Sep 18 02:54:04 srv-ubuntu-dev3 sshd[64106]: Failed password for invalid user mts from 79.143.44.122 port 53748 ssh2
Sep 18 02:58:00 srv-ubuntu-dev3 sshd[64542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122  user=root
Sep 18 02:58:02 srv-ubuntu-dev3 sshd[64542]: Failed password for root from 79.143.44.122 port 59605 ssh2
Sep 18 03:01:59 srv-ubuntu-dev3 sshd[65050]: Invalid user gentry from 79.143.44.122
Sep 18 03:01:59 srv-ubuntu-dev3 sshd[65050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122
Sep 18 03:01:59 srv-ubuntu-dev3 sshd[65050]: Invalid user gentry from 79.143.44.
...
2020-09-18 12:56:26
36.22.232.93 attackbotsspam
Total attacks: 2
2020-09-18 13:17:03
61.227.136.32 attackspambots
Sep 17 14:01:40 logopedia-1vcpu-1gb-nyc1-01 sshd[377225]: Failed password for root from 61.227.136.32 port 57508 ssh2
...
2020-09-18 13:11:47
14.240.127.244 attackspam
Automatic report - Port Scan Attack
2020-09-18 13:12:39
51.75.30.238 attack
Brute-force attempt banned
2020-09-18 13:18:08

Recently Reported IPs

159.225.14.248 183.44.5.199 76.29.133.176 189.162.165.30
92.90.33.110 121.71.151.90 132.227.168.109 108.248.71.160
110.158.115.36 168.0.108.32 81.230.77.44 104.244.74.16
190.6.93.174 177.143.125.110 139.170.9.255 90.114.154.21
68.183.18.104 106.17.172.203 32.47.71.179 69.26.88.212