Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.30.14.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9428
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;243.30.14.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:43:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 149.14.30.243.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.14.30.243.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.29.81.56 attackspambots
Jul 29 19:41:19 TORMINT sshd\[28967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.29.81.56  user=root
Jul 29 19:41:21 TORMINT sshd\[28967\]: Failed password for root from 52.29.81.56 port 44095 ssh2
Jul 29 19:46:27 TORMINT sshd\[29115\]: Invalid user postgres from 52.29.81.56
Jul 29 19:46:27 TORMINT sshd\[29115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.29.81.56
...
2019-07-30 07:50:36
210.48.139.228 attack
Jul 29 11:34:52 mail postfix/postscreen[10598]: PREGREET 14 after 0.59 from [210.48.139.228]:39952: EHLO loss.it

...
2019-07-30 07:26:13
140.143.236.53 attack
Jul 29 18:34:42 ms-srv sshd[8325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.236.53
Jul 29 18:34:44 ms-srv sshd[8325]: Failed password for invalid user admin from 140.143.236.53 port 47624 ssh2
2019-07-30 07:34:26
179.108.105.53 attackspam
Jul 30 01:34:13 h2177944 sshd\[19743\]: Invalid user egf from 179.108.105.53 port 44182
Jul 30 01:34:13 h2177944 sshd\[19743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.105.53
Jul 30 01:34:15 h2177944 sshd\[19743\]: Failed password for invalid user egf from 179.108.105.53 port 44182 ssh2
Jul 30 01:46:00 h2177944 sshd\[19965\]: Invalid user 1qaz2wsx@@ from 179.108.105.53 port 41082
Jul 30 01:46:00 h2177944 sshd\[19965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.105.53
...
2019-07-30 07:50:13
178.20.231.176 attackbotsspam
langenachtfulda.de 178.20.231.176 \[30/Jul/2019:00:07:12 +0200\] "POST /wp-login.php HTTP/1.1" 200 6029 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
langenachtfulda.de 178.20.231.176 \[30/Jul/2019:00:07:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 5994 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-30 08:08:44
180.211.233.195 attackbots
IP: 180.211.233.195
ASN: AS45588 Bangladesh Telecommunications Company Limited (BTCL) Nationwide
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:34:16 PM UTC
2019-07-30 07:49:41
121.186.14.44 attackspam
Jul 30 01:48:31 srv-4 sshd\[20631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.14.44  user=root
Jul 30 01:48:32 srv-4 sshd\[20631\]: Failed password for root from 121.186.14.44 port 12479 ssh2
Jul 30 01:53:54 srv-4 sshd\[20783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.14.44  user=root
...
2019-07-30 07:26:48
188.168.153.162 attack
IP: 188.168.153.162
ASN: AS15774 Closed Joint Stock Company TransTeleCom
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:34:30 PM UTC
2019-07-30 07:41:44
125.131.149.4 attackbotsspam
Jul 29 20:33:23 srv-4 sshd\[13263\]: Invalid user admin from 125.131.149.4
Jul 29 20:33:23 srv-4 sshd\[13263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.131.149.4
Jul 29 20:33:25 srv-4 sshd\[13263\]: Failed password for invalid user admin from 125.131.149.4 port 42697 ssh2
...
2019-07-30 08:06:53
178.128.104.252 attackspambots
Invalid user admin from 178.128.104.252 port 40518
2019-07-30 08:03:19
202.45.147.17 attackspam
SSH invalid-user multiple login try
2019-07-30 07:44:53
182.72.106.122 attack
IP: 182.72.106.122
ASN: AS9498 BHARTI Airtel Ltd.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 29/07/2019 5:34:20 PM UTC
2019-07-30 07:48:17
104.238.103.72 attackbots
Wordpress Admin Login attack
2019-07-30 07:47:18
192.241.159.27 attackspam
2019-07-29T16:11:09.391644mizuno.rwx.ovh sshd[18740]: Connection from 192.241.159.27 port 44376 on 78.46.61.178 port 22
2019-07-29T16:11:15.220379mizuno.rwx.ovh sshd[18740]: Invalid user php5 from 192.241.159.27 port 44376
2019-07-29T16:11:15.228453mizuno.rwx.ovh sshd[18740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.159.27
2019-07-29T16:11:09.391644mizuno.rwx.ovh sshd[18740]: Connection from 192.241.159.27 port 44376 on 78.46.61.178 port 22
2019-07-29T16:11:15.220379mizuno.rwx.ovh sshd[18740]: Invalid user php5 from 192.241.159.27 port 44376
2019-07-29T16:11:17.093586mizuno.rwx.ovh sshd[18740]: Failed password for invalid user php5 from 192.241.159.27 port 44376 ssh2
...
2019-07-30 07:24:13
68.183.117.200 attackbots
xmlrpc attack
2019-07-30 07:38:54

Recently Reported IPs

120.36.17.99 39.150.77.120 211.175.233.72 217.4.230.64
178.81.61.59 229.25.25.147 193.65.91.160 133.251.32.49
60.88.127.120 62.76.81.112 161.176.59.96 93.68.183.215
29.254.66.117 79.117.207.100 146.21.181.7 125.69.127.143
191.169.242.206 193.232.59.17 137.66.6.140 89.99.204.183