Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.121.71.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.121.71.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:01:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.71.121.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.71.121.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.254.159.157 attackbots
fail2ban honeypot
2019-10-09 01:52:04
80.211.80.154 attack
Oct  8 08:05:49 h2022099 sshd[1466]: reveeclipse mapping checking getaddrinfo for host154-80-211-80.serverdedicati.aruba.hostname [80.211.80.154] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  8 08:05:49 h2022099 sshd[1466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154  user=r.r
Oct  8 08:05:51 h2022099 sshd[1466]: Failed password for r.r from 80.211.80.154 port 33248 ssh2
Oct  8 08:05:51 h2022099 sshd[1466]: Received disconnect from 80.211.80.154: 11: Bye Bye [preauth]
Oct  8 08:22:09 h2022099 sshd[4003]: reveeclipse mapping checking getaddrinfo for host154-80-211-80.serverdedicati.aruba.hostname [80.211.80.154] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  8 08:22:09 h2022099 sshd[4003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154  user=r.r
Oct  8 08:22:11 h2022099 sshd[4003]: Failed password for r.r from 80.211.80.154 port 57696 ssh2
Oct  8 08:22:11 h2022099 sshd[4........
-------------------------------
2019-10-09 01:53:01
94.23.212.137 attackbots
Oct  8 19:07:42 root sshd[24274]: Failed password for root from 94.23.212.137 port 46562 ssh2
Oct  8 19:11:51 root sshd[24370]: Failed password for root from 94.23.212.137 port 38276 ssh2
...
2019-10-09 01:34:01
123.115.209.157 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-10-09 02:02:03
219.69.83.16 attack
Sep 26 11:57:28 dallas01 sshd[16986]: Failed password for root from 219.69.83.16 port 44562 ssh2
Sep 26 11:57:29 dallas01 sshd[16986]: Failed password for root from 219.69.83.16 port 44562 ssh2
Sep 26 11:57:32 dallas01 sshd[16986]: Failed password for root from 219.69.83.16 port 44562 ssh2
Sep 26 11:57:34 dallas01 sshd[16986]: Failed password for root from 219.69.83.16 port 44562 ssh2
2019-10-09 01:39:44
202.152.15.12 attack
Oct  8 07:05:56 rb06 sshd[10370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.15.12  user=r.r
Oct  8 07:05:57 rb06 sshd[10370]: Failed password for r.r from 202.152.15.12 port 50538 ssh2
Oct  8 07:05:58 rb06 sshd[10370]: Received disconnect from 202.152.15.12: 11: Bye Bye [preauth]
Oct  8 07:25:09 rb06 sshd[7112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.152.15.12  user=r.r
Oct  8 07:25:11 rb06 sshd[7112]: Failed password for r.r from 202.152.15.12 port 44812 ssh2
Oct  8 07:25:11 rb06 sshd[7112]: Received disconnect from 202.152.15.12: 11: Bye Bye [preauth]
Oct  8 07:29:44 rb06 sshd[30157]: Failed password for invalid user 321 from 202.152.15.12 port 54286 ssh2
Oct  8 07:29:44 rb06 sshd[30157]: Received disconnect from 202.152.15.12: 11: Bye Bye [preauth]
Oct  8 07:34:21 rb06 sshd[1756]: Failed password for invalid user 123Outlook from 202.152.15.12 port 35542 ssh2
Oct........
-------------------------------
2019-10-09 01:44:50
86.124.84.83 attackspambots
Automatic report - Port Scan Attack
2019-10-09 01:42:18
104.42.27.187 attackbotsspam
Oct  8 12:36:32 microserver sshd[10984]: Invalid user asdf@123456 from 104.42.27.187 port 10816
Oct  8 12:36:32 microserver sshd[10984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.27.187
Oct  8 12:36:33 microserver sshd[10984]: Failed password for invalid user asdf@123456 from 104.42.27.187 port 10816 ssh2
Oct  8 12:41:56 microserver sshd[11635]: Invalid user Puzzle2017 from 104.42.27.187 port 64640
Oct  8 12:41:56 microserver sshd[11635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.27.187
Oct  8 12:52:30 microserver sshd[12974]: Invalid user ROOT@2016 from 104.42.27.187 port 39488
Oct  8 12:52:30 microserver sshd[12974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.27.187
Oct  8 12:52:32 microserver sshd[12974]: Failed password for invalid user ROOT@2016 from 104.42.27.187 port 39488 ssh2
Oct  8 12:57:13 microserver sshd[13614]: Invalid user %TGB6yhn&UJM fro
2019-10-09 01:55:17
200.34.88.37 attack
2019-10-08T19:53:57.941143tmaserv sshd\[22630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.88.37
2019-10-08T19:53:59.485967tmaserv sshd\[22630\]: Failed password for invalid user Linda-123 from 200.34.88.37 port 58122 ssh2
2019-10-08T20:06:57.767130tmaserv sshd\[23387\]: Invalid user Super2017 from 200.34.88.37 port 34874
2019-10-08T20:06:57.771828tmaserv sshd\[23387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.34.88.37
2019-10-08T20:06:59.397694tmaserv sshd\[23387\]: Failed password for invalid user Super2017 from 200.34.88.37 port 34874 ssh2
2019-10-08T20:11:29.608388tmaserv sshd\[23609\]: Invalid user de3sw2aq1 from 200.34.88.37 port 45942
...
2019-10-09 01:35:47
219.73.114.139 attack
Jun  4 06:54:04 ubuntu sshd[27763]: Failed password for invalid user sammy from 219.73.114.139 port 57822 ssh2
Jun  4 06:56:55 ubuntu sshd[27832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.73.114.139
Jun  4 06:56:57 ubuntu sshd[27832]: Failed password for invalid user data from 219.73.114.139 port 52694 ssh2
2019-10-09 01:34:35
104.236.244.98 attackspam
2019-10-08T14:03:33.735676abusebot-7.cloudsearch.cf sshd\[17596\]: Invalid user Isabel123 from 104.236.244.98 port 44744
2019-10-09 01:45:52
151.8.21.15 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-10-09 01:44:00
160.20.111.66 attackspambots
160.20.108.0/22 blockede 
turkey not allowed
2019-10-09 01:49:22
185.187.94.82 attackbotsspam
Automatic report - Port Scan Attack
2019-10-09 01:59:59
222.186.175.163 attackbots
Oct  8 22:41:31 gw1 sshd[22228]: Failed password for root from 222.186.175.163 port 46468 ssh2
Oct  8 22:41:50 gw1 sshd[22228]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 46468 ssh2 [preauth]
...
2019-10-09 01:47:31

Recently Reported IPs

172.104.221.243 95.249.85.45 24.133.117.133 69.228.12.244
27.237.248.213 90.71.208.202 153.7.30.99 62.126.180.79
186.44.178.43 201.160.20.199 153.6.170.231 72.240.83.184
246.246.70.69 200.211.112.14 137.16.137.18 89.31.122.218
13.232.111.122 178.184.82.53 178.108.42.143 29.146.174.109