Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nairobi

Region: Nairobi Province

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.140.246.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.140.246.124.		IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070301 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 04 08:41:09 CST 2020
;; MSG SIZE  rcvd: 119
Host info
124.246.140.102.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 124.246.140.102.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
220.132.209.150 attackbotsspam
Port probing on unauthorized port 88
2020-07-31 13:04:56
218.9.243.65 attackbotsspam
Unauthorised access (Jul 31) SRC=218.9.243.65 LEN=40 TTL=46 ID=58066 TCP DPT=8080 WINDOW=18678 SYN
2020-07-31 13:10:55
69.132.114.174 attack
Jul 30 21:12:22 mockhub sshd[10007]: Failed password for root from 69.132.114.174 port 36352 ssh2
...
2020-07-31 13:11:57
14.143.187.242 attackbots
Invalid user jmsroot from 14.143.187.242 port 40306
2020-07-31 13:00:42
51.158.70.82 attackspam
Invalid user yu from 51.158.70.82 port 50232
2020-07-31 13:08:26
123.25.30.252 attackbots
IP 123.25.30.252 attacked honeypot on port: 22 at 7/30/2020 8:54:49 PM
2020-07-31 13:27:06
206.189.123.250 attack
Invalid user q from 206.189.123.250 port 53786
2020-07-31 13:35:02
222.186.175.167 attackbotsspam
Jul 31 07:23:38 eventyay sshd[23795]: Failed password for root from 222.186.175.167 port 56432 ssh2
Jul 31 07:23:52 eventyay sshd[23795]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 56432 ssh2 [preauth]
Jul 31 07:23:59 eventyay sshd[23798]: Failed password for root from 222.186.175.167 port 7574 ssh2
...
2020-07-31 13:33:06
106.51.80.198 attackbots
Invalid user test2 from 106.51.80.198 port 47480
2020-07-31 13:04:01
94.232.136.126 attackspam
Jul 31 07:06:18 OPSO sshd\[32284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126  user=root
Jul 31 07:06:19 OPSO sshd\[32284\]: Failed password for root from 94.232.136.126 port 58250 ssh2
Jul 31 07:10:33 OPSO sshd\[401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126  user=root
Jul 31 07:10:34 OPSO sshd\[401\]: Failed password for root from 94.232.136.126 port 53606 ssh2
Jul 31 07:14:35 OPSO sshd\[493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.232.136.126  user=root
2020-07-31 13:28:45
138.197.25.187 attack
(sshd) Failed SSH login from 138.197.25.187 (US/United States/-): 5 in the last 3600 secs
2020-07-31 13:09:13
45.134.179.57 attack
2020-07-30 09:41:30 Reject access to port(s):3389 1 times a day
2020-07-31 13:15:38
164.132.101.92 attack
$f2bV_matches
2020-07-31 13:13:12
154.137.141.103 attackbotsspam
2020-07-31 12:57:35
49.233.155.170 attack
Invalid user cwz from 49.233.155.170 port 35376
2020-07-31 13:27:37

Recently Reported IPs

82.20.114.128 67.26.32.126 189.147.96.252 75.86.17.209
173.93.105.88 219.217.163.198 30.157.115.175 201.3.18.14
81.248.66.244 13.83.45.61 190.30.60.120 151.25.79.156
50.238.239.125 63.31.58.94 186.161.208.92 152.186.210.132
92.83.170.211 107.180.156.247 99.158.41.176 99.180.141.194