Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.124.89.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.124.89.34.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 11:05:36 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 34.89.124.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.89.124.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.254.32.133 attackbotsspam
Jun 26 21:42:27 web-main sshd[22211]: Invalid user mysql from 51.254.32.133 port 54386
Jun 26 21:42:30 web-main sshd[22211]: Failed password for invalid user mysql from 51.254.32.133 port 54386 ssh2
Jun 26 21:59:32 web-main sshd[22300]: Invalid user jira from 51.254.32.133 port 40058
2020-06-27 05:00:40
80.82.65.74 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 72 - port: 8060 proto: TCP cat: Misc Attack
2020-06-27 05:09:58
124.204.65.82 attackspambots
Jun 26 23:45:00 lukav-desktop sshd\[29091\]: Invalid user ans from 124.204.65.82
Jun 26 23:45:00 lukav-desktop sshd\[29091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.65.82
Jun 26 23:45:01 lukav-desktop sshd\[29091\]: Failed password for invalid user ans from 124.204.65.82 port 32766 ssh2
Jun 26 23:48:01 lukav-desktop sshd\[29160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.65.82  user=root
Jun 26 23:48:03 lukav-desktop sshd\[29160\]: Failed password for root from 124.204.65.82 port 35815 ssh2
2020-06-27 04:55:47
104.206.128.10 attackbotsspam
TCP port : 10437
2020-06-27 05:03:22
112.85.42.174 attackspambots
Failed password for invalid user from 112.85.42.174 port 60249 ssh2
2020-06-27 05:09:11
37.59.37.69 attackspam
Jun 26 21:55:24 pornomens sshd\[16067\]: Invalid user sinusbot from 37.59.37.69 port 58141
Jun 26 21:55:24 pornomens sshd\[16067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
Jun 26 21:55:25 pornomens sshd\[16067\]: Failed password for invalid user sinusbot from 37.59.37.69 port 58141 ssh2
...
2020-06-27 05:24:09
195.224.138.61 attack
Jun 26 16:55:21 vps46666688 sshd[11593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.224.138.61
Jun 26 16:55:23 vps46666688 sshd[11593]: Failed password for invalid user ghh from 195.224.138.61 port 49624 ssh2
...
2020-06-27 05:24:44
212.70.149.34 attackbots
2020-06-26T14:56:03.381419linuxbox-skyline auth[248233]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=s83 rhost=212.70.149.34
...
2020-06-27 04:58:38
106.54.202.136 attack
Jun 26 22:55:30 h2779839 sshd[3076]: Invalid user admin1 from 106.54.202.136 port 45994
Jun 26 22:55:30 h2779839 sshd[3076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.202.136
Jun 26 22:55:30 h2779839 sshd[3076]: Invalid user admin1 from 106.54.202.136 port 45994
Jun 26 22:55:32 h2779839 sshd[3076]: Failed password for invalid user admin1 from 106.54.202.136 port 45994 ssh2
Jun 26 22:59:02 h2779839 sshd[3162]: Invalid user jy from 106.54.202.136 port 57362
Jun 26 22:59:02 h2779839 sshd[3162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.202.136
Jun 26 22:59:02 h2779839 sshd[3162]: Invalid user jy from 106.54.202.136 port 57362
Jun 26 22:59:04 h2779839 sshd[3162]: Failed password for invalid user jy from 106.54.202.136 port 57362 ssh2
Jun 26 23:02:38 h2779839 sshd[3315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.202.136  user=root
Jun
...
2020-06-27 05:11:22
222.186.180.142 attack
$f2bV_matches
2020-06-27 05:30:11
139.60.63.190 attackspam
Port 22 Scan, PTR: None
2020-06-27 05:27:26
52.172.53.254 attackbotsspam
2020-06-26T14:40:25.828740linuxbox-skyline sshd[247845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.53.254  user=root
2020-06-26T14:40:27.820034linuxbox-skyline sshd[247845]: Failed password for root from 52.172.53.254 port 54711 ssh2
...
2020-06-27 04:56:23
139.199.59.31 attack
Jun 26 22:06:03 meumeu sshd[68339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31  user=root
Jun 26 22:06:05 meumeu sshd[68339]: Failed password for root from 139.199.59.31 port 46616 ssh2
Jun 26 22:07:34 meumeu sshd[68394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31  user=root
Jun 26 22:07:36 meumeu sshd[68394]: Failed password for root from 139.199.59.31 port 64226 ssh2
Jun 26 22:09:11 meumeu sshd[68593]: Invalid user odoo from 139.199.59.31 port 25331
Jun 26 22:09:11 meumeu sshd[68593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.59.31 
Jun 26 22:09:11 meumeu sshd[68593]: Invalid user odoo from 139.199.59.31 port 25331
Jun 26 22:09:12 meumeu sshd[68593]: Failed password for invalid user odoo from 139.199.59.31 port 25331 ssh2
Jun 26 22:12:14 meumeu sshd[68682]: Invalid user postgres from 139.199.59.31 port 60545
...
2020-06-27 05:18:32
122.138.115.155 attack
Unauthorised access (Jun 26) SRC=122.138.115.155 LEN=40 TTL=46 ID=10389 TCP DPT=8080 WINDOW=1451 SYN 
Unauthorised access (Jun 26) SRC=122.138.115.155 LEN=40 TTL=46 ID=57195 TCP DPT=8080 WINDOW=50743 SYN
2020-06-27 04:53:14
75.179.185.47 attackbotsspam
Port 22 Scan, PTR: None
2020-06-27 05:22:43

Recently Reported IPs

106.125.105.110 106.125.130.252 106.125.100.156 106.124.50.19
106.125.18.246 106.124.52.156 106.124.62.41 106.124.45.85
106.124.98.98 106.124.39.175 106.124.32.174 106.124.46.213
106.125.183.36 106.125.174.110 106.124.230.35 106.124.231.75
106.124.243.190 106.124.238.48 106.124.201.141 106.124.248.155