Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.131.16.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.131.16.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 18:43:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 99.16.131.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.16.131.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.45.211 attackbots
2020-08-14 22:40:51
179.61.172.230 attackspam
2020-08-14 22:22:33
35.220.220.94 attackbots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-14 22:31:11
138.197.96.238 attackspam
2020-08-14 22:46:57
113.161.20.3 attackbotsspam
Lines containing failures of 113.161.20.3
Jul 29 08:44:42 server-name sshd[11934]: Invalid user mohammad from 113.161.20.3 port 48528
Jul 29 08:44:42 server-name sshd[11934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.20.3 
Jul 29 08:44:44 server-name sshd[11934]: Failed password for invalid user mohammad from 113.161.20.3 port 48528 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.161.20.3
2020-08-14 22:01:32
165.227.210.10 attack
2020-08-14 22:33:39
222.186.175.182 attackspam
Aug 14 04:04:16 php1 sshd\[12055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 14 04:04:18 php1 sshd\[12055\]: Failed password for root from 222.186.175.182 port 42666 ssh2
Aug 14 04:04:21 php1 sshd\[12055\]: Failed password for root from 222.186.175.182 port 42666 ssh2
Aug 14 04:04:24 php1 sshd\[12055\]: Failed password for root from 222.186.175.182 port 42666 ssh2
Aug 14 04:04:28 php1 sshd\[12055\]: Failed password for root from 222.186.175.182 port 42666 ssh2
2020-08-14 22:09:25
162.219.176.251 attackbots
2020-08-14 22:35:40
218.92.0.224 attack
Aug 14 16:02:52 eventyay sshd[4464]: Failed password for root from 218.92.0.224 port 14359 ssh2
Aug 14 16:03:07 eventyay sshd[4464]: error: maximum authentication attempts exceeded for root from 218.92.0.224 port 14359 ssh2 [preauth]
Aug 14 16:03:14 eventyay sshd[4467]: Failed password for root from 218.92.0.224 port 38316 ssh2
...
2020-08-14 22:06:58
173.213.85.186 attackspambots
2020-08-14 22:23:21
161.35.32.43 attackspam
Aug 14 14:01:58 game-panel sshd[4796]: Failed password for root from 161.35.32.43 port 47962 ssh2
Aug 14 14:05:46 game-panel sshd[4965]: Failed password for root from 161.35.32.43 port 59504 ssh2
2020-08-14 22:24:07
185.192.70.200 attackspam
2020-08-14 22:16:25
172.94.23.91 attackbots
2020-08-14 22:27:25
172.94.22.47 attack
2020-08-14 22:28:00
61.92.251.82 attack
Automatic report - Banned IP Access
2020-08-14 22:26:48

Recently Reported IPs

60.190.195.136 203.227.214.38 147.201.13.90 171.202.134.9
73.220.220.14 52.65.197.105 40.193.194.73 57.100.33.150
198.25.188.255 53.232.201.236 122.94.90.179 49.119.200.179
170.47.28.11 71.130.132.134 175.5.206.30 185.34.191.93
222.149.239.191 130.130.178.197 122.131.176.133 99.93.158.129