Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.153.139.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.153.139.129.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:52:10 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 129.139.153.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.139.153.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.236.29 attackspam
2019-09-12T06:17:32.707453abusebot-8.cloudsearch.cf sshd\[4670\]: Invalid user alex from 68.183.236.29 port 58150
2019-09-12 14:45:02
117.50.44.215 attack
$f2bV_matches
2019-09-12 15:27:57
182.219.172.224 attackspam
Sep 12 09:01:04 markkoudstaal sshd[19034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224
Sep 12 09:01:07 markkoudstaal sshd[19034]: Failed password for invalid user 1234 from 182.219.172.224 port 53490 ssh2
Sep 12 09:08:51 markkoudstaal sshd[19723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224
2019-09-12 15:18:41
78.39.93.212 attackbotsspam
Telnet Server BruteForce Attack
2019-09-12 14:34:42
31.154.16.105 attackspam
Sep 12 08:45:39 mail sshd\[3065\]: Invalid user administrator from 31.154.16.105 port 53430
Sep 12 08:45:39 mail sshd\[3065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.154.16.105
Sep 12 08:45:42 mail sshd\[3065\]: Failed password for invalid user administrator from 31.154.16.105 port 53430 ssh2
Sep 12 08:52:21 mail sshd\[4183\]: Invalid user devops from 31.154.16.105 port 56949
Sep 12 08:52:21 mail sshd\[4183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.154.16.105
2019-09-12 15:15:44
114.47.213.223 attack
Telnet Server BruteForce Attack
2019-09-12 15:02:28
157.230.91.45 attackbots
Sep 11 21:02:31 hpm sshd\[19124\]: Invalid user 123456 from 157.230.91.45
Sep 11 21:02:31 hpm sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
Sep 11 21:02:33 hpm sshd\[19124\]: Failed password for invalid user 123456 from 157.230.91.45 port 57862 ssh2
Sep 11 21:08:20 hpm sshd\[19656\]: Invalid user sysadmin123 from 157.230.91.45
Sep 11 21:08:20 hpm sshd\[19656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
2019-09-12 15:20:22
77.247.110.135 attackbotsspam
\[2019-09-12 02:58:58\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T02:58:58.403-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="4325101148333554002",SessionID="0x7fd9a863a768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/62889",ACLName="no_extension_match"
\[2019-09-12 02:59:47\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T02:59:47.440-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1462201148833566007",SessionID="0x7fd9a8361898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/64419",ACLName="no_extension_match"
\[2019-09-12 03:00:20\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-12T03:00:20.711-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="2905901148857315011",SessionID="0x7fd9a8361898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.135/53547",
2019-09-12 15:21:01
65.98.111.218 attack
Sep 12 08:48:54 mail sshd\[3679\]: Invalid user 321 from 65.98.111.218 port 55460
Sep 12 08:48:54 mail sshd\[3679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218
Sep 12 08:48:56 mail sshd\[3679\]: Failed password for invalid user 321 from 65.98.111.218 port 55460 ssh2
Sep 12 08:54:29 mail sshd\[4629\]: Invalid user qwerty from 65.98.111.218 port 58050
Sep 12 08:54:29 mail sshd\[4629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218
2019-09-12 15:14:53
81.131.52.98 attackspambots
Bruteforce on SSH Honeypot
2019-09-12 15:17:40
37.59.53.22 attackbotsspam
Sep 12 08:06:59 tux-35-217 sshd\[23666\]: Invalid user 12345 from 37.59.53.22 port 60158
Sep 12 08:06:59 tux-35-217 sshd\[23666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.53.22
Sep 12 08:07:01 tux-35-217 sshd\[23666\]: Failed password for invalid user 12345 from 37.59.53.22 port 60158 ssh2
Sep 12 08:12:15 tux-35-217 sshd\[23703\]: Invalid user steampass from 37.59.53.22 port 36874
Sep 12 08:12:15 tux-35-217 sshd\[23703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.53.22
...
2019-09-12 15:18:00
165.22.22.158 attack
2019-09-12T07:08:50.544257abusebot-8.cloudsearch.cf sshd\[5002\]: Invalid user 123 from 165.22.22.158 port 55072
2019-09-12 15:09:43
189.59.136.217 attackbotsspam
Telnet Server BruteForce Attack
2019-09-12 15:21:35
162.241.193.116 attackspam
Sep 11 20:49:16 tdfoods sshd\[29010\]: Invalid user teamspeak1 from 162.241.193.116
Sep 11 20:49:16 tdfoods sshd\[29010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
Sep 11 20:49:19 tdfoods sshd\[29010\]: Failed password for invalid user teamspeak1 from 162.241.193.116 port 45556 ssh2
Sep 11 20:55:32 tdfoods sshd\[29524\]: Invalid user m1n3cr@ft from 162.241.193.116
Sep 11 20:55:32 tdfoods sshd\[29524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
2019-09-12 14:56:06
39.88.108.214 attackbots
Sep 12 07:36:12 www sshd\[9356\]: Invalid user ubnt from 39.88.108.214
Sep 12 07:36:12 www sshd\[9356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.88.108.214
Sep 12 07:36:15 www sshd\[9356\]: Failed password for invalid user ubnt from 39.88.108.214 port 38121 ssh2
...
2019-09-12 15:01:22

Recently Reported IPs

38.26.232.38 82.243.47.55 47.29.192.36 35.25.63.141
173.32.194.148 112.167.159.140 188.51.88.58 62.129.57.176
246.91.34.0 121.204.232.14 76.127.151.202 248.124.223.153
223.136.16.128 226.76.185.77 30.63.159.135 13.17.1.143
168.65.146.244 6.37.179.215 176.249.173.150 72.146.184.202