Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russia

Internet Service Provider: unknown

Hostname: unknown

Organization: OJSC Ufanet

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
81.30.192.250 attackbotsspam
Spam relay
2020-06-30 03:19:04
81.30.192.180 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 10-02-2020 13:40:11.
2020-02-11 00:34:12
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.30.192.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5718
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.30.192.74.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 19:02:02 +08 2019
;; MSG SIZE  rcvd: 116

Host info
74.192.30.81.in-addr.arpa domain name pointer 81.30.192.74.static.ufanet.ru.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
74.192.30.81.in-addr.arpa	name = 81.30.192.74.static.ufanet.ru.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
51.38.186.47 attackspambots
Oct 28 22:13:57 SilenceServices sshd[19841]: Failed password for root from 51.38.186.47 port 50072 ssh2
Oct 28 22:17:30 SilenceServices sshd[23410]: Failed password for root from 51.38.186.47 port 60012 ssh2
2019-10-29 08:00:07
196.43.165.48 attack
Invalid user com from 196.43.165.48 port 33542
2019-10-29 07:49:07
45.40.135.73 attackbots
Automatic report - XMLRPC Attack
2019-10-29 08:01:11
39.53.125.70 attackbotsspam
firewall-block, port(s): 1433/tcp
2019-10-29 08:02:08
46.101.88.10 attack
Invalid user applmgr from 46.101.88.10 port 54844
2019-10-29 07:43:34
117.0.35.153 attackbots
Invalid user 4office from 117.0.35.153 port 61480
2019-10-29 07:34:50
198.98.56.32 attackspam
Invalid user ki from 198.98.56.32 port 60056
2019-10-29 07:26:22
200.116.105.213 attack
Invalid user test from 200.116.105.213 port 57174
2019-10-29 07:25:53
36.66.149.211 attackbotsspam
Invalid user ftpuser from 36.66.149.211 port 50012
2019-10-29 07:45:05
180.168.141.246 attackbots
Invalid user admin3 from 180.168.141.246 port 51832
2019-10-29 07:27:48
106.13.1.203 attackbotsspam
Invalid user jiong from 106.13.1.203 port 36514
2019-10-29 07:36:20
45.114.244.56 attack
Invalid user www from 45.114.244.56 port 33147
2019-10-29 08:00:44
197.48.33.136 attackspam
Invalid user admin from 197.48.33.136 port 43607
2019-10-29 07:48:44
85.173.28.37 attackspambots
Port Scan: TCP/443
2019-10-29 07:40:43
129.158.73.231 attackbots
Invalid user ark from 129.158.73.231 port 31213
2019-10-29 07:55:25

Recently Reported IPs

160.131.50.216 91.121.230.188 200.95.175.74 150.7.40.133
188.209.52.208 185.172.110.217 206.180.131.246 42.19.20.141
179.55.246.132 82.242.219.22 159.203.78.76 136.112.146.192
138.68.165.102 114.251.0.190 121.183.101.126 87.70.126.151
213.73.35.219 36.75.170.209 94.177.240.64 44.105.50.195