Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.94.97.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.94.97.30.			IN	A

;; AUTHORITY SECTION:
.			351	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 13:31:04 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 30.97.94.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.97.94.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.36.28.70 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:48:21
18.138.130.156 attackspam
 
23 novembre 2019 
️You-did it!__  
$𝟐𝟑,𝟒𝟖𝟐.𝟒𝟖 𝐀𝐝𝐝𝐞𝐝 𝐓𝐨 𝐘𝐨𝐮𝐫 𝐀𝐜𝐜𝐨𝐮𝐧𝐭,𝐂𝐡𝐞𝐜𝐤 𝐈𝐭 𝐍𝐨𝐰️▁ ▂ ▄ ▅ ▆ ▇ █𝐏𝐥𝐞𝐚𝐬𝐞 𝐂𝐨𝐧𝐟𝐢𝐫𝐦 𝐑𝐞𝐜𝐞𝐢𝐩𝐭 █ ▇ ▆ ▅ ▄ ▂ ▁ 
IP 18.138.130.156
2019-11-24 04:28:44
106.13.83.251 attackbotsspam
Invalid user ti from 106.13.83.251 port 58712
2019-11-24 04:25:51
189.41.228.107 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:54:02
63.83.73.195 attackspambots
Autoban   63.83.73.195 AUTH/CONNECT
2019-11-24 04:37:52
45.22.209.58 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:31:52
220.248.30.58 attack
2019-11-23T17:23:19.374504struts4.enskede.local sshd\[11726\]: Invalid user info from 220.248.30.58 port 46570
2019-11-23T17:23:19.380520struts4.enskede.local sshd\[11726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
2019-11-23T17:23:22.557464struts4.enskede.local sshd\[11726\]: Failed password for invalid user info from 220.248.30.58 port 46570 ssh2
2019-11-23T17:30:35.156988struts4.enskede.local sshd\[11744\]: Invalid user kkkkkk from 220.248.30.58 port 26775
2019-11-23T17:30:35.166440struts4.enskede.local sshd\[11744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
...
2019-11-24 04:32:34
218.69.91.84 attack
Nov 23 20:05:03 vmd17057 sshd\[4449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84  user=root
Nov 23 20:05:05 vmd17057 sshd\[4449\]: Failed password for root from 218.69.91.84 port 46351 ssh2
Nov 23 20:08:49 vmd17057 sshd\[4717\]: Invalid user nieber from 218.69.91.84 port 34625
...
2019-11-24 04:56:59
191.6.84.3 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-24 04:52:10
187.109.169.45 attackbotsspam
SMTP-SASL bruteforce attempt
2019-11-24 04:27:56
1.203.115.64 attackspam
" "
2019-11-24 04:46:27
114.96.169.141 attackspambots
badbot
2019-11-24 04:22:12
121.41.43.230 attackbotsspam
firewall-block, port(s): 80/tcp, 8080/tcp
2019-11-24 04:18:54
223.215.186.210 attack
badbot
2019-11-24 04:24:10
187.191.60.178 attackspam
Nov 23 11:54:37 ws19vmsma01 sshd[171496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178
Nov 23 11:54:39 ws19vmsma01 sshd[171496]: Failed password for invalid user admin from 187.191.60.178 port 38208 ssh2
...
2019-11-24 04:55:59

Recently Reported IPs

194.32.99.88 173.245.203.40 77.222.114.74 189.208.91.49
45.65.213.49 187.111.41.6 80.225.179.210 147.182.231.25
39.190.111.242 40.107.5.134 152.89.160.148 156.204.248.134
46.12.63.97 191.5.91.68 41.72.203.14 89.179.64.75
175.207.246.72 205.164.158.154 60.250.51.63 59.99.195.72