Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.94.30.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.94.30.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:39:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 22.30.94.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.30.94.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.63.120.109 attackbots
port scan and connect, tcp 23 (telnet)
2020-03-28 09:34:36
92.118.37.55 attackspambots
Mar 28 04:13:53 [host] kernel: [1994718.009759] [U
Mar 28 04:32:27 [host] kernel: [1995832.536209] [U
Mar 28 04:34:54 [host] kernel: [1995979.589116] [U
Mar 28 04:44:57 [host] kernel: [1996582.206148] [U
Mar 28 04:53:38 [host] kernel: [1997103.022844] [U
Mar 28 04:55:38 [host] kernel: [1997223.003468] [U
2020-03-28 12:08:22
60.221.48.4 attackbotsspam
(ftpd) Failed FTP login from 60.221.48.4 (CN/China/4.48.221.60.adsl-pool.sx.cn): 10 in the last 3600 secs
2020-03-28 12:00:52
106.13.140.52 attack
Mar 28 04:53:02 plex sshd[10606]: Invalid user nlj from 106.13.140.52 port 34600
Mar 28 04:53:02 plex sshd[10606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.52
Mar 28 04:53:02 plex sshd[10606]: Invalid user nlj from 106.13.140.52 port 34600
Mar 28 04:53:04 plex sshd[10606]: Failed password for invalid user nlj from 106.13.140.52 port 34600 ssh2
Mar 28 04:55:39 plex sshd[10681]: Invalid user bjo from 106.13.140.52 port 42320
2020-03-28 12:06:55
49.235.229.211 attackbotsspam
SSH brute force
2020-03-28 09:16:38
51.68.84.36 attackbotsspam
Mar 28 01:25:39 localhost sshd[84902]: Invalid user hiu from 51.68.84.36 port 34292
Mar 28 01:25:39 localhost sshd[84902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.84.36
Mar 28 01:25:39 localhost sshd[84902]: Invalid user hiu from 51.68.84.36 port 34292
Mar 28 01:25:42 localhost sshd[84902]: Failed password for invalid user hiu from 51.68.84.36 port 34292 ssh2
Mar 28 01:29:42 localhost sshd[85256]: Invalid user dss from 51.68.84.36 port 58120
...
2020-03-28 09:39:55
113.190.130.38 attackspambots
Mar 27 22:14:42 piServer sshd[11422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.130.38 
Mar 27 22:14:44 piServer sshd[11422]: Failed password for invalid user admin from 113.190.130.38 port 56068 ssh2
Mar 27 22:14:51 piServer sshd[11436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.190.130.38 
...
2020-03-28 09:18:14
45.221.73.94 attackbotsspam
DATE:2020-03-27 22:14:23, IP:45.221.73.94, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-03-28 09:39:04
68.183.48.172 attackbots
Brute-force attempt banned
2020-03-28 09:36:16
104.131.13.199 attackspambots
(sshd) Failed SSH login from 104.131.13.199 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 05:42:48 s1 sshd[28142]: Invalid user bnf from 104.131.13.199 port 45100
Mar 28 05:42:50 s1 sshd[28142]: Failed password for invalid user bnf from 104.131.13.199 port 45100 ssh2
Mar 28 05:53:11 s1 sshd[28414]: Invalid user reu from 104.131.13.199 port 33710
Mar 28 05:53:13 s1 sshd[28414]: Failed password for invalid user reu from 104.131.13.199 port 33710 ssh2
Mar 28 05:56:32 s1 sshd[28487]: Invalid user brj from 104.131.13.199 port 46362
2020-03-28 12:07:58
222.186.42.7 attack
Mar 28 02:09:19 MainVPS sshd[31419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Mar 28 02:09:22 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
Mar 28 02:09:24 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
Mar 28 02:09:19 MainVPS sshd[31419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Mar 28 02:09:22 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
Mar 28 02:09:24 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
Mar 28 02:09:19 MainVPS sshd[31419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Mar 28 02:09:22 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
Mar 28 02:09:24 MainVPS sshd[31419]: Failed password for root from 222.186.42.7 port 40270 ssh2
M
2020-03-28 09:09:58
222.138.158.101 attack
Mar 28 04:55:47 debian-2gb-nbg1-2 kernel: \[7626815.758768\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.138.158.101 DST=195.201.40.59 LEN=86 TOS=0x00 PREC=0x00 TTL=43 ID=17972 DF PROTO=UDP SPT=1194 DPT=5353 LEN=66
2020-03-28 12:01:59
177.37.71.40 attackspambots
Mar 28 01:02:02 ewelt sshd[17833]: Invalid user jrv from 177.37.71.40 port 51393
Mar 28 01:02:02 ewelt sshd[17833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.71.40
Mar 28 01:02:02 ewelt sshd[17833]: Invalid user jrv from 177.37.71.40 port 51393
Mar 28 01:02:04 ewelt sshd[17833]: Failed password for invalid user jrv from 177.37.71.40 port 51393 ssh2
...
2020-03-28 09:19:43
64.227.25.170 attackbots
Invalid user at from 64.227.25.170 port 52678
2020-03-28 09:27:50
42.200.66.164 attackspambots
SSH Brute-Force attacks
2020-03-28 12:07:43

Recently Reported IPs

70.244.52.118 129.200.90.160 138.183.105.3 134.57.86.165
200.183.193.6 175.183.219.93 201.34.4.50 84.162.37.72
27.253.140.6 96.90.165.67 200.227.33.207 160.220.236.140
167.211.1.103 82.192.119.196 136.95.133.56 173.129.184.14
194.18.223.89 21.179.135.51 52.133.215.134 226.180.180.191