Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yerevan

Region: Yerevan

Country: Armenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.139.30.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.139.30.71.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 18 01:34:26 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 71.30.139.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.30.139.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.24 attackspambots
" "
2019-07-09 09:40:38
106.12.211.247 attackbotsspam
Jul  8 19:37:32 ip-172-31-62-245 sshd\[25267\]: Invalid user network from 106.12.211.247\
Jul  8 19:37:35 ip-172-31-62-245 sshd\[25267\]: Failed password for invalid user network from 106.12.211.247 port 49672 ssh2\
Jul  8 19:40:17 ip-172-31-62-245 sshd\[25380\]: Invalid user etherpad-lite from 106.12.211.247\
Jul  8 19:40:19 ip-172-31-62-245 sshd\[25380\]: Failed password for invalid user etherpad-lite from 106.12.211.247 port 49106 ssh2\
Jul  8 19:41:55 ip-172-31-62-245 sshd\[25457\]: Invalid user ik from 106.12.211.247\
2019-07-09 09:55:06
186.220.252.151 attackbots
Jul  9 02:53:56 mout sshd[19536]: Invalid user system from 186.220.252.151 port 57462
2019-07-09 09:22:04
159.65.245.203 attackbotsspam
Jul  9 02:31:49 pornomens sshd\[15884\]: Invalid user diamond from 159.65.245.203 port 55360
Jul  9 02:31:49 pornomens sshd\[15884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.245.203
Jul  9 02:31:51 pornomens sshd\[15884\]: Failed password for invalid user diamond from 159.65.245.203 port 55360 ssh2
...
2019-07-09 09:26:56
212.26.232.118 attack
Unauthorized connection attempt from IP address 212.26.232.118 on Port 445(SMB)
2019-07-09 09:59:15
168.232.149.101 attackspambots
Unauthorized connection attempt from IP address 168.232.149.101 on Port 445(SMB)
2019-07-09 09:55:40
177.129.206.114 attackbots
failed_logins
2019-07-09 09:37:06
79.143.37.84 attackbotsspam
Spam to target mail address hacked/leaked/bought from Kachingle
2019-07-09 09:35:01
218.76.69.60 attackbots
" "
2019-07-09 09:13:04
217.11.27.77 attack
Unauthorized connection attempt from IP address 217.11.27.77 on Port 445(SMB)
2019-07-09 10:00:07
84.242.125.234 attackbotsspam
Jul  8 06:04:57 penfold postfix/smtpd[1351]: connect from static-84-242-125-234.net.upcbroadband.cz[84.242.125.234]
Jul  8 06:04:57 penfold postfix/smtpd[1351]: 9ABFE21448: client=static-84-242-125-234.net.upcbroadband.cz[84.242.125.234]
Jul  8 06:04:59 penfold opendkim[2847]: 9ABFE21448: static-84-242-125-234.net.upcbroadband.cz [84.242.125.234] not internal
Jul  8 06:04:59 penfold postfix/smtpd[1351]: disconnect from static-84-242-125-234.net.upcbroadband.cz[84.242.125.234] ehlo=1 mail=1 rcpt=1 data=1 quhostname=1 commands=5
Jul  8 15:49:14 penfold postfix/smtpd[26553]: connect from static-84-242-125-234.net.upcbroadband.cz[84.242.125.234]
Jul x@x
Jul  8 15:49:14 penfold postfix/smtpd[26553]: disconnect from static-84-242-125-234.net.upcbroadband.cz[84.242.125.234] ehlo=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=4/6
Jul  8 15:49:30 penfold postfix/smtpd[26045]: connect from static-84-242-125-234.net.upcbroadband.cz[84.242.125.234]
Jul x@x
Jul  8 15:49........
-------------------------------
2019-07-09 09:21:36
141.98.10.32 attackbots
Jul  8 15:42:58 cac1d2 postfix/smtpd\[7795\]: warning: unknown\[141.98.10.32\]: SASL LOGIN authentication failed: authentication failure
Jul  8 16:55:10 cac1d2 postfix/smtpd\[17610\]: warning: unknown\[141.98.10.32\]: SASL LOGIN authentication failed: authentication failure
Jul  8 18:08:08 cac1d2 postfix/smtpd\[27521\]: warning: unknown\[141.98.10.32\]: SASL LOGIN authentication failed: authentication failure
...
2019-07-09 09:50:22
46.3.96.71 attackspambots
09.07.2019 00:57:47 Connection to port 335 blocked by firewall
2019-07-09 09:19:47
201.148.217.198 attackbotsspam
smtp auth brute force
2019-07-09 10:00:36
51.254.140.108 attackbots
Jul  8 18:32:58 MK-Soft-VM3 sshd\[27277\]: Invalid user hadoopuser from 51.254.140.108 port 42485
Jul  8 18:32:58 MK-Soft-VM3 sshd\[27277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.140.108
Jul  8 18:33:01 MK-Soft-VM3 sshd\[27277\]: Failed password for invalid user hadoopuser from 51.254.140.108 port 42485 ssh2
...
2019-07-09 09:40:59

Recently Reported IPs

26.123.74.239 43.156.44.229 116.193.14.109 151.114.111.208
41.221.0.58 169.64.21.40 2a01:598:8190:95e:19d0:5d3a:51de:d50c 139.205.40.174
155.106.224.249 201.232.213.202 239.250.128.22 144.235.32.242
98.161.73.226 244.187.245.107 147.27.184.167 13.94.246.37
197.47.10.234 157.19.200.68 120.126.5.27 136.201.30.3