Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.155.149.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.155.149.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 08:53:37 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 138.149.155.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.149.155.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.222.105.69 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:48:13,620 INFO [amun_request_handler] PortScan Detected on Port: 445 (77.222.105.69)
2019-09-22 02:19:15
139.215.217.181 attackbotsspam
SSH invalid-user multiple login attempts
2019-09-22 02:16:08
153.254.113.26 attack
Sep 21 14:15:57 plusreed sshd[4045]: Invalid user webmaster from 153.254.113.26
...
2019-09-22 02:18:59
119.28.24.83 attackspambots
Sep 21 20:39:09 tuotantolaitos sshd[18859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.24.83
Sep 21 20:39:10 tuotantolaitos sshd[18859]: Failed password for invalid user cactiuser from 119.28.24.83 port 46478 ssh2
...
2019-09-22 02:03:31
23.28.50.172 attackbotsspam
/wp-login.php
2019-09-22 01:58:00
94.191.78.128 attackspambots
2019-09-21T16:35:54.541945abusebot.cloudsearch.cf sshd\[4781\]: Invalid user wv from 94.191.78.128 port 43286
2019-09-22 02:28:19
37.145.241.172 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 11:47:46,230 INFO [amun_request_handler] PortScan Detected on Port: 445 (37.145.241.172)
2019-09-22 02:22:57
27.115.124.69 attackbots
Automatic report - Banned IP Access
2019-09-22 02:30:31
209.97.142.132 attackspam
LAMP,DEF GET /wp-login.php
2019-09-22 01:48:24
51.38.200.249 attackspam
Sep 21 03:04:05 cumulus sshd[27755]: Did not receive identification string from 51.38.200.249 port 41868
Sep 21 03:04:05 cumulus sshd[27756]: Did not receive identification string from 51.38.200.249 port 37632
Sep 21 03:04:05 cumulus sshd[27757]: Did not receive identification string from 51.38.200.249 port 42234
Sep 21 03:04:05 cumulus sshd[27758]: Did not receive identification string from 51.38.200.249 port 55054
Sep 21 03:04:05 cumulus sshd[27759]: Did not receive identification string from 51.38.200.249 port 48626
Sep 21 03:04:05 cumulus sshd[27760]: Did not receive identification string from 51.38.200.249 port 58322
Sep 21 03:04:05 cumulus sshd[27761]: Did not receive identification string from 51.38.200.249 port 41100
Sep 21 03:04:47 cumulus sshd[27766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.200.249  user=r.r
Sep 21 03:04:48 cumulus sshd[27768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui........
-------------------------------
2019-09-22 02:26:58
87.130.14.62 attack
Sep 21 17:28:17 ns37 sshd[7835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.130.14.62
2019-09-22 02:13:50
177.125.164.225 attack
$f2bV_matches
2019-09-22 02:31:37
213.100.250.96 attack
Sep 21 14:53:25 MK-Soft-VM6 sshd[7406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.100.250.96 
Sep 21 14:53:27 MK-Soft-VM6 sshd[7406]: Failed password for invalid user pi from 213.100.250.96 port 59150 ssh2
...
2019-09-22 02:07:57
91.121.211.59 attackbotsspam
Jan 25 15:36:39 vtv3 sshd\[769\]: Invalid user ftpadmin from 91.121.211.59 port 49600
Jan 25 15:36:39 vtv3 sshd\[769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Jan 25 15:36:40 vtv3 sshd\[769\]: Failed password for invalid user ftpadmin from 91.121.211.59 port 49600 ssh2
Jan 25 15:40:34 vtv3 sshd\[2149\]: Invalid user developer from 91.121.211.59 port 51954
Jan 25 15:40:34 vtv3 sshd\[2149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Feb  4 09:04:16 vtv3 sshd\[305\]: Invalid user mysql2 from 91.121.211.59 port 40978
Feb  4 09:04:16 vtv3 sshd\[305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59
Feb  4 09:04:18 vtv3 sshd\[305\]: Failed password for invalid user mysql2 from 91.121.211.59 port 40978 ssh2
Feb  4 09:08:29 vtv3 sshd\[1811\]: Invalid user vyos from 91.121.211.59 port 44986
Feb  4 09:08:29 vtv3 sshd\[1811\]: pam_unix\(
2019-09-22 02:32:17
188.166.109.87 attackbotsspam
Sep 21 19:04:58 rotator sshd\[30444\]: Invalid user ubuntu3 from 188.166.109.87Sep 21 19:05:00 rotator sshd\[30444\]: Failed password for invalid user ubuntu3 from 188.166.109.87 port 56322 ssh2Sep 21 19:09:25 rotator sshd\[31242\]: Invalid user voyles from 188.166.109.87Sep 21 19:09:27 rotator sshd\[31242\]: Failed password for invalid user voyles from 188.166.109.87 port 41626 ssh2Sep 21 19:13:40 rotator sshd\[32025\]: Invalid user hadoopuser from 188.166.109.87Sep 21 19:13:43 rotator sshd\[32025\]: Failed password for invalid user hadoopuser from 188.166.109.87 port 55150 ssh2
...
2019-09-22 02:04:48

Recently Reported IPs

200.241.117.15 173.65.145.217 83.89.7.76 173.215.215.98
4.217.220.202 60.17.67.8 249.52.38.115 20.206.32.132
244.183.152.11 99.185.138.174 91.46.209.4 144.199.31.241
160.237.76.220 193.226.91.110 24.229.207.103 137.182.105.186
116.58.197.198 46.210.1.255 125.144.239.84 200.92.7.232