Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.213.9.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.213.9.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 05:09:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 242.9.213.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.9.213.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.20.158 attack
ssh failed login
2019-06-29 18:43:14
34.90.154.47 attackbots
Jun 29 08:39:53   TCP Attack: SRC=34.90.154.47 DST=[Masked] LEN=59 TOS=0x00 PREC=0x00 TTL=122  DF PROTO=TCP SPT=57236 DPT=80 WINDOW=515 RES=0x00 ACK PSH URGP=0
2019-06-29 18:36:26
182.73.220.18 attackspambots
Jun 29 10:38:58 ncomp sshd[30183]: Invalid user lun from 182.73.220.18
Jun 29 10:38:58 ncomp sshd[30183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.220.18
Jun 29 10:38:58 ncomp sshd[30183]: Invalid user lun from 182.73.220.18
Jun 29 10:39:00 ncomp sshd[30183]: Failed password for invalid user lun from 182.73.220.18 port 59852 ssh2
2019-06-29 18:57:37
37.255.222.208 attackspambots
timhelmke.de 37.255.222.208 \[29/Jun/2019:10:37:52 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4067 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36"
timhelmke.de 37.255.222.208 \[29/Jun/2019:10:37:56 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4067 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/59.0.3071.109 Safari/537.36"
2019-06-29 19:18:16
45.122.221.239 attackbots
Sql/code injection probe
2019-06-29 19:17:24
144.217.170.65 attackspam
Jun 29 09:24:53 localhost sshd\[12199\]: Invalid user zhouh from 144.217.170.65 port 35822
Jun 29 09:24:53 localhost sshd\[12199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.170.65
Jun 29 09:24:55 localhost sshd\[12199\]: Failed password for invalid user zhouh from 144.217.170.65 port 35822 ssh2
...
2019-06-29 18:47:53
183.236.34.137 attack
DATE:2019-06-29 10:39:00, IP:183.236.34.137, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-06-29 18:57:20
185.49.241.230 attackspambots
[portscan] Port scan
2019-06-29 18:32:44
178.32.57.140 attackbotsspam
178.32.57.140 - - \[29/Jun/2019:10:39:34 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.32.57.140 - - \[29/Jun/2019:10:39:35 +0200\] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-06-29 18:45:38
123.24.7.153 attackbots
Jun 29 08:19:40 master sshd[23618]: Failed password for invalid user admin from 123.24.7.153 port 55836 ssh2
2019-06-29 18:36:58
128.123.82.192 attackspam
Jun 29 08:19:48 master sshd[23620]: Failed password for invalid user admin from 128.123.82.192 port 48213 ssh2
2019-06-29 18:33:08
176.118.0.56 attackspambots
[portscan] Port scan
2019-06-29 18:53:02
183.88.33.144 attackspam
Jun 29 07:53:03 master sshd[23573]: Failed password for invalid user admin from 183.88.33.144 port 48898 ssh2
2019-06-29 18:42:44
67.104.19.194 attack
19/6/29@04:47:00: FAIL: Alarm-Intrusion address from=67.104.19.194
...
2019-06-29 18:34:44
177.67.53.20 attack
smtp auth brute force
2019-06-29 18:43:49

Recently Reported IPs

19.109.220.238 4.178.242.39 249.57.176.166 56.188.142.201
36.95.242.136 154.44.187.82 184.149.203.3 115.53.236.145
216.125.63.236 84.225.43.105 85.140.168.180 64.226.124.253
32.146.246.47 131.195.40.231 72.156.237.207 181.157.123.151
245.164.5.178 215.16.105.56 175.34.162.143 120.161.91.196