Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.85.17.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;30.85.17.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 16:15:33 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 149.17.85.30.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.17.85.30.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.172.151 attackspambots
3x Failed Password
2020-05-13 21:25:52
157.100.53.94 attackbotsspam
May 13 15:36:40 meumeu sshd[29601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.53.94 
May 13 15:36:43 meumeu sshd[29601]: Failed password for invalid user mu from 157.100.53.94 port 54640 ssh2
May 13 15:39:43 meumeu sshd[30147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.100.53.94 
...
2020-05-13 21:48:15
114.217.58.52 attack
May 13 14:49:36 server sshd[24632]: Failed password for root from 114.217.58.52 port 41522 ssh2
May 13 14:55:01 server sshd[25029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.217.58.52
May 13 14:55:03 server sshd[25029]: Failed password for invalid user revista from 114.217.58.52 port 36060 ssh2
...
2020-05-13 21:45:14
106.54.13.167 attackbots
May 13 13:43:25 game-panel sshd[21736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.13.167
May 13 13:43:27 game-panel sshd[21736]: Failed password for invalid user mh from 106.54.13.167 port 60808 ssh2
May 13 13:48:12 game-panel sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.13.167
2020-05-13 21:58:09
222.186.175.216 attack
May 13 15:21:15 pve1 sshd[17319]: Failed password for root from 222.186.175.216 port 26612 ssh2
May 13 15:21:20 pve1 sshd[17319]: Failed password for root from 222.186.175.216 port 26612 ssh2
...
2020-05-13 21:23:20
203.245.29.159 attackbotsspam
SSH brute force attempt
2020-05-13 21:36:18
138.197.195.52 attackbotsspam
May 13 14:50:50 legacy sshd[3664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52
May 13 14:50:51 legacy sshd[3664]: Failed password for invalid user pete from 138.197.195.52 port 59886 ssh2
May 13 14:55:13 legacy sshd[3866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52
...
2020-05-13 21:50:21
51.75.16.138 attack
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-05-13 21:43:18
104.248.192.145 attackbots
May 13 14:38:37 vmd26974 sshd[9681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.192.145
May 13 14:38:40 vmd26974 sshd[9681]: Failed password for invalid user game from 104.248.192.145 port 40420 ssh2
...
2020-05-13 21:34:14
117.50.65.85 attackspam
May 13 07:16:52 server1 sshd\[23115\]: Invalid user telcel3 from 117.50.65.85
May 13 07:16:52 server1 sshd\[23115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 
May 13 07:16:54 server1 sshd\[23115\]: Failed password for invalid user telcel3 from 117.50.65.85 port 36926 ssh2
May 13 07:19:17 server1 sshd\[23746\]: Invalid user hance from 117.50.65.85
May 13 07:19:17 server1 sshd\[23746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.65.85 
...
2020-05-13 21:28:18
178.62.234.124 attackbotsspam
SSH brute-force: detected 8 distinct usernames within a 24-hour window.
2020-05-13 21:33:26
145.239.78.111 attackspam
May 13 08:35:20 ny01 sshd[31321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.78.111
May 13 08:35:22 ny01 sshd[31321]: Failed password for invalid user gnu from 145.239.78.111 port 32924 ssh2
May 13 08:38:52 ny01 sshd[31727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.78.111
2020-05-13 21:20:26
87.251.74.192 attack
May 13 15:38:41 debian-2gb-nbg1-2 kernel: \[11635979.209891\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.192 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=34127 PROTO=TCP SPT=57061 DPT=109 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-13 21:47:40
106.54.141.65 attackspambots
2020-05-13T12:58:57.091793abusebot-7.cloudsearch.cf sshd[8522]: Invalid user deploy from 106.54.141.65 port 40986
2020-05-13T12:58:57.102341abusebot-7.cloudsearch.cf sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.65
2020-05-13T12:58:57.091793abusebot-7.cloudsearch.cf sshd[8522]: Invalid user deploy from 106.54.141.65 port 40986
2020-05-13T12:58:58.544294abusebot-7.cloudsearch.cf sshd[8522]: Failed password for invalid user deploy from 106.54.141.65 port 40986 ssh2
2020-05-13T13:03:41.794592abusebot-7.cloudsearch.cf sshd[8898]: Invalid user teste from 106.54.141.65 port 43832
2020-05-13T13:03:41.804314abusebot-7.cloudsearch.cf sshd[8898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.65
2020-05-13T13:03:41.794592abusebot-7.cloudsearch.cf sshd[8898]: Invalid user teste from 106.54.141.65 port 43832
2020-05-13T13:03:43.897748abusebot-7.cloudsearch.cf sshd[8898]: Failed pass
...
2020-05-13 21:31:05
106.12.220.19 attackspambots
May 13 14:47:11 haigwepa sshd[32612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.220.19 
May 13 14:47:12 haigwepa sshd[32612]: Failed password for invalid user user1 from 106.12.220.19 port 51740 ssh2
...
2020-05-13 21:50:41

Recently Reported IPs

202.13.23.229 67.19.209.234 219.12.146.57 179.230.98.244
100.7.237.180 89.0.246.66 85.43.233.105 190.33.21.167
55.222.37.38 180.233.169.144 238.163.31.239 81.215.215.101
199.44.104.12 223.6.169.209 32.191.109.235 186.68.90.198
138.189.69.69 167.23.123.25 206.222.52.196 176.175.56.177