Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.172.145.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.172.145.194.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 06:20:13 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 194.145.172.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.145.172.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.221.125 attack
$lgm
2020-09-01 05:12:23
85.206.26.249 attackbotsspam
31.08.2020 23:14:14 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-09-01 05:15:24
72.9.63.246 attackbotsspam
Unauthorised access (Aug 31) SRC=72.9.63.246 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=49357 TCP DPT=8080 WINDOW=35939 SYN 
Unauthorised access (Aug 30) SRC=72.9.63.246 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=40295 TCP DPT=8080 WINDOW=47214 SYN
2020-09-01 04:54:07
123.207.178.45 attack
Invalid user sorin from 123.207.178.45 port 46066
2020-09-01 05:08:25
83.234.176.99 attackspambots
20/8/31@08:27:22: FAIL: Alarm-Network address from=83.234.176.99
20/8/31@08:27:22: FAIL: Alarm-Network address from=83.234.176.99
...
2020-09-01 05:12:46
179.184.57.194 attackbots
2020-08-31T14:24:25.704355amanda2.illicoweb.com sshd\[27413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.57.194  user=ftp
2020-08-31T14:24:28.365797amanda2.illicoweb.com sshd\[27413\]: Failed password for ftp from 179.184.57.194 port 31225 ssh2
2020-08-31T14:27:55.322918amanda2.illicoweb.com sshd\[27600\]: Invalid user cactiuser from 179.184.57.194 port 46843
2020-08-31T14:27:55.328634amanda2.illicoweb.com sshd\[27600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.57.194
2020-08-31T14:27:57.152038amanda2.illicoweb.com sshd\[27600\]: Failed password for invalid user cactiuser from 179.184.57.194 port 46843 ssh2
...
2020-09-01 04:57:43
77.130.135.14 attackbotsspam
2020-08-31T13:38:56.167164dmca.cloudsearch.cf sshd[30381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.135.130.77.rev.sfr.net  user=root
2020-08-31T13:38:57.956994dmca.cloudsearch.cf sshd[30381]: Failed password for root from 77.130.135.14 port 2433 ssh2
2020-08-31T13:42:25.143376dmca.cloudsearch.cf sshd[30487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.135.130.77.rev.sfr.net  user=root
2020-08-31T13:42:26.958778dmca.cloudsearch.cf sshd[30487]: Failed password for root from 77.130.135.14 port 13889 ssh2
2020-08-31T13:45:50.014557dmca.cloudsearch.cf sshd[30536]: Invalid user rose from 77.130.135.14 port 25057
2020-08-31T13:45:50.020019dmca.cloudsearch.cf sshd[30536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.135.130.77.rev.sfr.net
2020-08-31T13:45:50.014557dmca.cloudsearch.cf sshd[30536]: Invalid user rose from 77.130.135.14 port 25057
2020-08-
...
2020-09-01 05:03:02
159.242.42.6 attack
2020-08-31T23:14:06.880941h2857900.stratoserver.net sshd[23697]: Invalid user admin from 159.242.42.6 port 46814
2020-08-31T23:14:08.051309h2857900.stratoserver.net sshd[23699]: Invalid user admin from 159.242.42.6 port 46855
...
2020-09-01 05:16:53
202.44.55.36 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-09-01 04:42:27
45.129.33.4 attack
SRC=45.129.33.4 PROTO=TCP SPT=51593 DPT=3364
2020-09-01 04:59:15
197.232.26.137 attack
1598876881 - 08/31/2020 14:28:01 Host: 197.232.26.137/197.232.26.137 Port: 445 TCP Blocked
2020-09-01 04:55:48
192.241.219.147 attackspam
port scan and connect, tcp 88 (kerberos-sec)
2020-09-01 04:49:59
172.105.201.117 attack
Icarus honeypot on github
2020-09-01 05:15:09
14.183.235.124 attack
1598876881 - 08/31/2020 14:28:01 Host: 14.183.235.124/14.183.235.124 Port: 445 TCP Blocked
...
2020-09-01 04:55:23
122.51.179.14 attack
2020-08-31T12:24:21.885273vps-d63064a2 sshd[14494]: Invalid user ubnt from 122.51.179.14 port 49448
2020-08-31T12:24:24.009513vps-d63064a2 sshd[14494]: Failed password for invalid user ubnt from 122.51.179.14 port 49448 ssh2
2020-08-31T12:27:32.416430vps-d63064a2 sshd[14523]: Invalid user www from 122.51.179.14 port 49662
2020-08-31T12:27:32.427620vps-d63064a2 sshd[14523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.179.14
2020-08-31T12:27:32.416430vps-d63064a2 sshd[14523]: Invalid user www from 122.51.179.14 port 49662
2020-08-31T12:27:33.760203vps-d63064a2 sshd[14523]: Failed password for invalid user www from 122.51.179.14 port 49662 ssh2
...
2020-09-01 05:07:16

Recently Reported IPs

97.40.80.86 189.147.19.5 75.185.96.183 64.212.104.179
141.245.227.228 220.59.49.119 46.188.226.168 81.208.211.96
250.15.248.49 59.58.87.42 70.122.196.24 88.215.96.104
40.221.224.151 103.235.148.59 196.16.187.185 250.164.224.126
124.37.191.80 46.253.137.222 8.134.171.141 238.173.97.153