Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.174.48.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.174.48.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 06:37:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.48.174.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.48.174.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.210.178.165 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 62-210-178-165.rev.poneytelecom.eu.
2019-09-07 17:01:37
218.92.0.180 attackbotsspam
Sep  7 02:27:22 Tower sshd[31335]: Connection from 218.92.0.180 port 65404 on 192.168.10.220 port 22
2019-09-07 16:22:42
86.121.167.53 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: 86-121-167-53.rdsnet.ro.
2019-09-07 16:53:53
206.189.181.12 attack
Sep  7 10:14:52 mc1 kernel: \[394672.399644\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=206.189.181.12 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=1880 PROTO=TCP SPT=34377 DPT=23 WINDOW=37977 RES=0x00 SYN URGP=0 
Sep  7 10:14:53 mc1 kernel: \[394672.797689\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=206.189.181.12 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=1880 PROTO=TCP SPT=34377 DPT=23 WINDOW=37977 RES=0x00 SYN URGP=0 
Sep  7 10:22:43 mc1 kernel: \[395143.515417\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=206.189.181.12 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=53 ID=1880 PROTO=TCP SPT=34377 DPT=23 WINDOW=37977 RES=0x00 SYN URGP=0 
...
2019-09-07 16:23:50
139.99.221.19 attackspam
Chat Spam
2019-09-07 16:35:02
64.79.101.52 attackbotsspam
$f2bV_matches
2019-09-07 16:54:15
46.101.204.153 attackbots
404 NOT FOUND
2019-09-07 16:42:15
192.241.249.53 attack
Reported by AbuseIPDB proxy server.
2019-09-07 16:51:25
171.43.54.12 attackspam
Sep  7 02:34:32 jupiter sshd\[6239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.43.54.12  user=root
Sep  7 02:34:34 jupiter sshd\[6239\]: Failed password for root from 171.43.54.12 port 36793 ssh2
Sep  7 02:34:50 jupiter sshd\[6239\]: error: maximum authentication attempts exceeded for root from 171.43.54.12 port 36793 ssh2 \[preauth\]
...
2019-09-07 16:51:51
203.110.90.195 attackbotsspam
Sep  7 08:11:19 OPSO sshd\[29836\]: Invalid user user from 203.110.90.195 port 37862
Sep  7 08:11:19 OPSO sshd\[29836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.90.195
Sep  7 08:11:21 OPSO sshd\[29836\]: Failed password for invalid user user from 203.110.90.195 port 37862 ssh2
Sep  7 08:16:36 OPSO sshd\[30534\]: Invalid user test from 203.110.90.195 port 59402
Sep  7 08:16:36 OPSO sshd\[30534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.90.195
2019-09-07 16:24:36
46.148.192.41 attack
Sep  7 06:50:34 www5 sshd\[3018\]: Invalid user ubuntu1 from 46.148.192.41
Sep  7 06:50:34 www5 sshd\[3018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.192.41
Sep  7 06:50:36 www5 sshd\[3018\]: Failed password for invalid user ubuntu1 from 46.148.192.41 port 41394 ssh2
...
2019-09-07 16:21:34
206.189.147.229 attackbots
2019-09-07T04:47:49.393872abusebot-5.cloudsearch.cf sshd\[11912\]: Invalid user admin from 206.189.147.229 port 48482
2019-09-07 16:49:43
212.83.163.47 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 212-83-163-47.rev.poneytelecom.eu.
2019-09-07 17:03:42
165.22.6.195 attackbots
$f2bV_matches
2019-09-07 16:31:10
186.137.123.202 attack
Sep  7 09:30:46 Ubuntu-1404-trusty-64-minimal sshd\[24242\]: Invalid user pp from 186.137.123.202
Sep  7 09:30:46 Ubuntu-1404-trusty-64-minimal sshd\[24242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.137.123.202
Sep  7 09:30:48 Ubuntu-1404-trusty-64-minimal sshd\[24242\]: Failed password for invalid user pp from 186.137.123.202 port 38828 ssh2
Sep  7 09:44:26 Ubuntu-1404-trusty-64-minimal sshd\[32751\]: Invalid user spike from 186.137.123.202
Sep  7 09:44:26 Ubuntu-1404-trusty-64-minimal sshd\[32751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.137.123.202
2019-09-07 16:27:08

Recently Reported IPs

57.115.76.77 97.45.197.149 232.104.213.78 238.243.121.166
225.171.114.207 110.4.171.193 160.203.215.168 179.196.227.51
78.18.151.203 24.221.150.150 127.130.204.39 65.227.229.84
75.142.11.231 57.206.129.29 138.143.198.34 255.92.78.100
88.208.211.248 237.205.242.131 7.8.173.229 209.7.45.178