Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of California, San Diego

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.21.208.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63763
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;44.21.208.30.			IN	A

;; AUTHORITY SECTION:
.			2821	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052202 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 23 19:27:41 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 30.208.21.44.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 30.208.21.44.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
27.2.98.183 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-25 07:30:41
117.144.189.69 attackspambots
Invalid user jjj from 117.144.189.69 port 56758
2020-01-25 07:40:32
78.221.115.22 attackbots
firewall-block, port(s): 22/tcp
2020-01-25 07:40:08
186.1.141.173 attack
Honeypot attack, port: 445, PTR: natpool-186-1-141-173.hnremote.net.
2020-01-25 07:50:08
222.186.173.142 attackspambots
Jan 25 00:46:16 ks10 sshd[482116]: Failed password for root from 222.186.173.142 port 46498 ssh2
Jan 25 00:46:20 ks10 sshd[482116]: Failed password for root from 222.186.173.142 port 46498 ssh2
...
2020-01-25 07:53:34
49.233.185.68 attackbotsspam
Unauthorized connection attempt detected from IP address 49.233.185.68 to port 2220 [J]
2020-01-25 07:43:53
14.215.51.76 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 07:28:40
61.153.247.165 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 07:41:18
81.30.193.114 attackbotsspam
Honeypot attack, port: 445, PTR: mail.peton.ru.
2020-01-25 07:38:14
190.145.25.49 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-25 07:45:08
58.56.32.238 attack
Unauthorized connection attempt detected from IP address 58.56.32.238 to port 2220 [J]
2020-01-25 07:46:19
188.255.120.102 attackbots
Honeypot attack, port: 445, PTR: broadband-188-255-120-102.ip.moscow.rt.ru.
2020-01-25 07:20:44
94.53.184.169 attack
Automatic report - Port Scan Attack
2020-01-25 07:34:26
218.64.216.87 attack
Unauthorized connection attempt detected from IP address 218.64.216.87 to port 1433 [J]
2020-01-25 07:59:32
120.133.236.138 attackspambots
Invalid user hadoop from 120.133.236.138 port 41514
2020-01-25 07:46:06

Recently Reported IPs

121.109.24.18 180.218.173.98 110.25.136.38 94.208.68.167
140.225.157.223 196.161.64.186 190.74.83.123 83.185.204.170
194.64.144.189 176.100.17.55 117.31.242.150 209.185.99.228
116.203.138.167 172.245.16.11 206.66.19.237 103.84.238.13
218.247.169.230 162.252.58.251 138.219.44.156 159.192.102.4