Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.139.11.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.139.11.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 11:35:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 45.11.139.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.11.139.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.41.203 attackspambots
Nov 11 17:56:40 vps666546 sshd\[26759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.41.203  user=root
Nov 11 17:56:42 vps666546 sshd\[26759\]: Failed password for root from 182.61.41.203 port 35232 ssh2
Nov 11 18:01:36 vps666546 sshd\[26930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.41.203  user=root
Nov 11 18:01:38 vps666546 sshd\[26930\]: Failed password for root from 182.61.41.203 port 35258 ssh2
Nov 11 18:06:24 vps666546 sshd\[27095\]: Invalid user brusdal from 182.61.41.203 port 34874
Nov 11 18:06:24 vps666546 sshd\[27095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.41.203
...
2019-11-12 01:14:56
106.13.6.116 attack
Nov 11 14:56:41 game-panel sshd[24288]: Failed password for postfix from 106.13.6.116 port 57406 ssh2
Nov 11 15:01:48 game-panel sshd[24433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116
Nov 11 15:01:49 game-panel sshd[24433]: Failed password for invalid user julie from 106.13.6.116 port 49670 ssh2
2019-11-12 00:44:58
167.71.60.209 attackbots
Automatic report - Banned IP Access
2019-11-12 00:53:30
159.203.197.6 attack
159.203.197.6 was recorded 5 times by 5 hosts attempting to connect to the following ports: 2380. Incident counter (4h, 24h, all-time): 5, 5, 49
2019-11-12 00:47:35
193.112.6.241 attackspambots
Nov 11 18:01:40 dedicated sshd[22174]: Invalid user ilie from 193.112.6.241 port 40218
2019-11-12 01:07:00
103.22.250.194 attackspambots
Automatic report - XMLRPC Attack
2019-11-12 01:16:31
104.248.115.231 attack
IP attempted unauthorised action
2019-11-12 01:10:46
223.171.46.146 attackbots
Nov 11 06:54:24 hanapaa sshd\[27241\]: Invalid user prasanna from 223.171.46.146
Nov 11 06:54:24 hanapaa sshd\[27241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.46.146
Nov 11 06:54:26 hanapaa sshd\[27241\]: Failed password for invalid user prasanna from 223.171.46.146 port 6433 ssh2
Nov 11 06:58:35 hanapaa sshd\[27565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.46.146  user=root
Nov 11 06:58:36 hanapaa sshd\[27565\]: Failed password for root from 223.171.46.146 port 6433 ssh2
2019-11-12 01:00:25
173.241.21.82 attack
Nov 11 15:32:16 ns382633 sshd\[29520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82  user=root
Nov 11 15:32:17 ns382633 sshd\[29520\]: Failed password for root from 173.241.21.82 port 47130 ssh2
Nov 11 15:43:50 ns382633 sshd\[31507\]: Invalid user clan from 173.241.21.82 port 33392
Nov 11 15:43:50 ns382633 sshd\[31507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82
Nov 11 15:43:53 ns382633 sshd\[31507\]: Failed password for invalid user clan from 173.241.21.82 port 33392 ssh2
2019-11-12 01:04:07
69.70.65.118 attackspam
Nov 11 15:44:43 ns382633 sshd\[31621\]: Invalid user ruskerk from 69.70.65.118 port 30647
Nov 11 15:44:43 ns382633 sshd\[31621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.70.65.118
Nov 11 15:44:45 ns382633 sshd\[31621\]: Failed password for invalid user ruskerk from 69.70.65.118 port 30647 ssh2
Nov 11 15:49:52 ns382633 sshd\[32472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.70.65.118  user=root
Nov 11 15:49:53 ns382633 sshd\[32472\]: Failed password for root from 69.70.65.118 port 4994 ssh2
2019-11-12 00:51:00
87.103.2.196 attack
Hit on /xmlrpc.php
2019-11-12 00:55:44
68.183.178.162 attack
Nov 11 17:06:19 srv-ubuntu-dev3 sshd[9492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162  user=root
Nov 11 17:06:21 srv-ubuntu-dev3 sshd[9492]: Failed password for root from 68.183.178.162 port 40306 ssh2
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: Invalid user vnet from 68.183.178.162
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Nov 11 17:10:13 srv-ubuntu-dev3 sshd[9910]: Invalid user vnet from 68.183.178.162
Nov 11 17:10:15 srv-ubuntu-dev3 sshd[9910]: Failed password for invalid user vnet from 68.183.178.162 port 49070 ssh2
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: Invalid user eternity from 68.183.178.162
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Nov 11 17:14:08 srv-ubuntu-dev3 sshd[10170]: Invalid user eternity from 6
...
2019-11-12 01:14:31
178.33.49.21 attack
Nov 11 17:45:00 root sshd[20917]: Failed password for root from 178.33.49.21 port 49606 ssh2
Nov 11 17:48:45 root sshd[20940]: Failed password for mysql from 178.33.49.21 port 57662 ssh2
...
2019-11-12 01:06:33
84.244.180.7 attackbotsspam
2019-11-11T17:45:52.448998mail01 postfix/smtpd[13701]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T17:54:54.263226mail01 postfix/smtpd[13701]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-11T17:54:59.203245mail01 postfix/smtpd[14466]: warning: opzetborstelshop.nl[84.244.180.7]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-12 00:58:50
157.245.95.69 attackspambots
ssh brute force
2019-11-12 01:11:17

Recently Reported IPs

153.124.179.150 209.251.13.123 187.107.241.11 233.146.140.186
76.223.169.225 117.165.176.249 236.109.103.251 120.69.79.72
159.175.60.22 120.95.123.179 17.96.96.47 205.99.186.203
103.79.168.112 30.177.167.168 66.125.234.238 246.93.220.175
12.107.101.31 63.90.67.158 219.199.62.246 220.235.216.240