Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.30.80.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;239.30.80.94.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023022800 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 28 14:31:32 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 94.80.30.239.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.80.30.239.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.91.102.173 attackbots
SSH brute force attempt
2020-04-07 17:28:03
103.87.107.179 attack
B: Magento admin pass test (wrong country)
2020-04-07 17:27:14
95.85.12.122 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-04-07 17:37:48
222.186.190.2 attack
Apr  7 06:04:30 firewall sshd[20699]: Failed password for root from 222.186.190.2 port 37274 ssh2
Apr  7 06:04:33 firewall sshd[20699]: Failed password for root from 222.186.190.2 port 37274 ssh2
Apr  7 06:04:37 firewall sshd[20699]: Failed password for root from 222.186.190.2 port 37274 ssh2
...
2020-04-07 17:13:46
77.65.79.150 attackbots
SSH auth scanning - multiple failed logins
2020-04-07 17:14:46
14.241.248.57 attackbotsspam
2020-04-07T10:36:09.040078librenms sshd[15012]: Invalid user admin from 14.241.248.57 port 54124
2020-04-07T10:36:11.065595librenms sshd[15012]: Failed password for invalid user admin from 14.241.248.57 port 54124 ssh2
2020-04-07T10:43:41.392753librenms sshd[15736]: Invalid user test from 14.241.248.57 port 45950
...
2020-04-07 17:34:49
27.77.143.103 attack
Automatic report - Port Scan Attack
2020-04-07 17:37:07
92.118.37.86 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 10002 proto: TCP cat: Misc Attack
2020-04-07 17:25:15
182.162.104.153 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-07 17:10:22
41.191.237.157 attackspambots
SSH brute-force attempt
2020-04-07 17:02:10
113.140.24.158 attackspam
04/06/2020-23:48:57.287115 113.140.24.158 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-07 17:43:12
192.241.238.220 attackspam
smtp
2020-04-07 17:31:04
84.2.226.70 attackbotsspam
(sshd) Failed SSH login from 84.2.226.70 (HU/Hungary/ktv5402E246.fixip.t-online.hu): 5 in the last 3600 secs
2020-04-07 17:25:43
112.21.191.252 attack
Tried sshing with brute force.
2020-04-07 17:32:34
165.22.101.76 attackbotsspam
Apr  7 09:41:19 rotator sshd\[14721\]: Invalid user admin from 165.22.101.76Apr  7 09:41:21 rotator sshd\[14721\]: Failed password for invalid user admin from 165.22.101.76 port 39736 ssh2Apr  7 09:44:14 rotator sshd\[14765\]: Invalid user ubuntu from 165.22.101.76Apr  7 09:44:16 rotator sshd\[14765\]: Failed password for invalid user ubuntu from 165.22.101.76 port 58144 ssh2Apr  7 09:47:14 rotator sshd\[15533\]: Invalid user azureuser from 165.22.101.76Apr  7 09:47:16 rotator sshd\[15533\]: Failed password for invalid user azureuser from 165.22.101.76 port 48314 ssh2
...
2020-04-07 17:03:34

Recently Reported IPs

21.65.89.22 45.194.114.222 90.28.15.56 17.151.8.35
79.116.188.163 122.17.166.142 45.154.13.205 21.236.11.114
225.34.179.167 42.29.95.127 136.75.50.123 94.132.63.0
233.130.52.135 28.55.93.70 138.212.128.64 112.186.170.1
254.196.249.131 113.24.58.187 156.199.205.53 132.6.227.2