Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toledo

Region: Ohio

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.30.17.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.30.17.5.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110502 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 06 05:27:59 CST 2020
;; MSG SIZE  rcvd: 114
Host info
5.17.30.99.in-addr.arpa domain name pointer 99-30-17-5.lightspeed.toldoh.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.17.30.99.in-addr.arpa	name = 99-30-17-5.lightspeed.toldoh.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.206.128.26 attackbots
Port scan(s) denied
2020-05-01 01:38:58
162.243.138.240 attack
Port scan(s) denied
2020-05-01 01:30:46
89.40.73.78 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=16384)(04301449)
2020-05-01 02:04:56
134.122.10.161 attackspambots
firewall-block, port(s): 23/tcp
2020-05-01 01:59:02
69.90.184.209 attackspam
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(04301449)
2020-05-01 01:41:38
94.191.120.108 attackbots
Apr 30 15:27:58 srv-ubuntu-dev3 sshd[111287]: Invalid user deploy from 94.191.120.108
Apr 30 15:27:58 srv-ubuntu-dev3 sshd[111287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
Apr 30 15:27:58 srv-ubuntu-dev3 sshd[111287]: Invalid user deploy from 94.191.120.108
Apr 30 15:28:00 srv-ubuntu-dev3 sshd[111287]: Failed password for invalid user deploy from 94.191.120.108 port 55146 ssh2
Apr 30 15:32:13 srv-ubuntu-dev3 sshd[111951]: Invalid user insserver from 94.191.120.108
Apr 30 15:32:13 srv-ubuntu-dev3 sshd[111951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
Apr 30 15:32:13 srv-ubuntu-dev3 sshd[111951]: Invalid user insserver from 94.191.120.108
Apr 30 15:32:16 srv-ubuntu-dev3 sshd[111951]: Failed password for invalid user insserver from 94.191.120.108 port 45002 ssh2
Apr 30 15:36:41 srv-ubuntu-dev3 sshd[112748]: Invalid user webuser from 94.191.120.108
...
2020-05-01 01:40:09
159.65.160.203 attackspam
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=65535)(04301449)
2020-05-01 01:32:26
46.39.223.148 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=9485)(04301449)
2020-05-01 01:44:55
40.79.114.133 attack
Brute forcing RDP port 3389
2020-05-01 01:47:35
51.15.118.114 attackbots
SSH Brute Force
2020-05-01 01:44:35
121.10.252.112 attackbotsspam
Unauthorized connection attempt detected from IP address 121.10.252.112 to port 23 [T]
2020-05-01 02:00:16
162.243.138.190 attackspam
scans once in preceeding hours on the ports (in chronological order) 7002 resulting in total of 71 scans from 162.243.0.0/16 block.
2020-05-01 01:31:21
162.243.137.10 attackbotsspam
Multiport scan 2 ports : 995(x4) 7777
2020-05-01 01:31:44
45.125.66.204 attackbotsspam
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(04301449)
2020-05-01 01:46:02
78.84.115.162 attackspambots
Port 23 (Telnet) access denied
2020-05-01 01:40:56

Recently Reported IPs

128.199.22.102 104.47.58.107 45.195.7.202 176.59.214.237
77.136.85.3 77.127.41.152 95.178.61.12 95.178.18.55
51.253.46.199 51.39.76.121 164.68.127.47 176.110.168.114
216.58.200.129 200.152.38.155 179.127.175.242 122.14.218.119
150.207.146.74 110.229.219.100 103.31.53.2 111.2.5.222