Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.30.139.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.30.139.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:37:00 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 166.139.30.241.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.139.30.241.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.234.157.240 attack
GPON Home Routers Remote Code Execution Vulnerability  CVE 2018-10562, PTR: PTR record not found
2020-09-01 03:27:53
162.243.129.8 attackbots
Aug 31 13:19:33 askasleikir openvpn[508]: 162.243.129.8:33310 WARNING: Bad encapsulated packet length from peer (17736), which must be > 0 and <= 1627 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
2020-09-01 03:39:42
112.237.90.55 attackbotsspam
Port Scan detected!
...
2020-09-01 03:22:46
175.157.10.19 attackspambots
Spammer
2020-09-01 03:41:38
182.111.246.126 attackspam
Time:     Mon Aug 31 09:24:46 2020 -0300
IP:       182.111.246.126 (CN/China/-)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-09-01 03:38:03
218.31.99.30 attackspambots
Email rejected due to spam filtering
2020-09-01 03:13:01
172.104.242.173 attackspambots
 TCP (SYN) 172.104.242.173:40996 -> port 3000, len 44
2020-09-01 03:48:37
91.236.116.185 attackspam
IP: 91.236.116.185
Ports affected
    Simple Mail Transfer (25) 
    Message Submission (587) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS42237 Icme Limited
   Sweden (SE)
   CIDR 91.236.116.0/24
Log Date: 31/08/2020 2:44:26 PM UTC
2020-09-01 03:29:10
176.102.215.20 attack
Unauthorized connection attempt from IP address 176.102.215.20 on Port 445(SMB)
2020-09-01 03:29:40
176.113.115.53 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-01 03:18:53
46.246.3.254 attackbotsspam
Looking for a wallet
2020-09-01 03:33:30
139.59.150.201 attackspam
 TCP (SYN) 139.59.150.201:59528 -> port 4649, len 44
2020-09-01 03:25:06
103.81.114.55 attack
Unauthorized connection attempt from IP address 103.81.114.55 on Port 445(SMB)
2020-09-01 03:12:32
116.113.30.26 attack
Port Scan/VNC login attempt
...
2020-09-01 03:28:25
107.151.184.138 attackspambots
 TCP (SYN) 107.151.184.138:58105 -> port 1804, len 44
2020-09-01 03:26:45

Recently Reported IPs

220.81.83.86 65.39.112.32 157.77.243.206 87.177.241.253
233.136.246.54 92.98.103.197 104.102.143.205 49.94.117.40
79.7.85.132 52.45.74.223 131.177.40.46 86.64.13.196
59.21.91.59 63.76.129.219 142.2.111.100 106.86.13.136
48.89.72.251 217.166.113.23 153.218.210.140 231.64.72.233