Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.124.137.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.124.137.66.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 03:06:42 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 66.137.124.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.137.124.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.210.114.58 attack
SSH Brute-Forcing (server1)
2020-04-06 03:32:42
39.117.42.31 attackbotsspam
SSH_attack
2020-04-06 03:23:33
79.173.253.197 attack
" "
2020-04-06 03:23:17
162.243.128.92 attackspam
" "
2020-04-06 03:54:18
184.105.139.115 attackspambots
9200/tcp 4786/tcp 1883/tcp...
[2020-02-11/04-05]16pkt,9pt.(tcp),1pt.(udp)
2020-04-06 03:59:35
141.98.81.110 attack
2020-04-05T19:46:47.075626abusebot-5.cloudsearch.cf sshd[17364]: Invalid user 1234 from 141.98.81.110 port 59988
2020-04-05T19:46:47.081590abusebot-5.cloudsearch.cf sshd[17364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.110
2020-04-05T19:46:47.075626abusebot-5.cloudsearch.cf sshd[17364]: Invalid user 1234 from 141.98.81.110 port 59988
2020-04-05T19:46:49.650763abusebot-5.cloudsearch.cf sshd[17364]: Failed password for invalid user 1234 from 141.98.81.110 port 59988 ssh2
2020-04-05T19:47:23.474117abusebot-5.cloudsearch.cf sshd[17431]: Invalid user user from 141.98.81.110 port 48724
2020-04-05T19:47:23.479780abusebot-5.cloudsearch.cf sshd[17431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.110
2020-04-05T19:47:23.474117abusebot-5.cloudsearch.cf sshd[17431]: Invalid user user from 141.98.81.110 port 48724
2020-04-05T19:47:25.657553abusebot-5.cloudsearch.cf sshd[17431]: Failed pass
...
2020-04-06 03:50:34
222.186.190.2 attackbots
Apr  5 21:24:58 mail sshd\[5092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Apr  5 21:25:00 mail sshd\[5092\]: Failed password for root from 222.186.190.2 port 42012 ssh2
Apr  5 21:25:04 mail sshd\[5092\]: Failed password for root from 222.186.190.2 port 42012 ssh2
...
2020-04-06 03:31:55
185.249.92.184 attackbotsspam
Automatic report - Port Scan Attack
2020-04-06 03:30:26
68.183.146.178 attackbots
2020-04-05T19:15:35.283588shield sshd\[4714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.146.178  user=root
2020-04-05T19:15:37.190703shield sshd\[4714\]: Failed password for root from 68.183.146.178 port 36328 ssh2
2020-04-05T19:19:09.097439shield sshd\[5696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.146.178  user=root
2020-04-05T19:19:11.052866shield sshd\[5696\]: Failed password for root from 68.183.146.178 port 46698 ssh2
2020-04-05T19:22:30.396734shield sshd\[6607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.146.178  user=root
2020-04-06 03:33:27
46.101.1.131 attack
2020-04-05T18:58:45.441003Z 224d22f047ec New connection: 46.101.1.131:38243 (172.17.0.4:2222) [session: 224d22f047ec]
2020-04-05T19:00:32.996538Z c7226b9d0f83 New connection: 46.101.1.131:48242 (172.17.0.4:2222) [session: c7226b9d0f83]
2020-04-06 03:29:56
106.12.210.127 attackbots
5x Failed Password
2020-04-06 03:41:06
211.63.196.119 attackspam
Unauthorized connection attempt detected from IP address 211.63.196.119 to port 23
2020-04-06 03:45:28
164.132.54.215 attackbotsspam
Apr 05 09:53:00 askasleikir sshd[112540]: Failed password for root from 164.132.54.215 port 52716 ssh2
Apr 05 10:04:18 askasleikir sshd[112650]: Failed password for root from 164.132.54.215 port 51762 ssh2
Apr 05 09:55:51 askasleikir sshd[112571]: Failed password for root from 164.132.54.215 port 52476 ssh2
2020-04-06 03:56:33
162.243.128.43 attackbots
Metasploit VxWorks WDB Agent Scanner Detection
2020-04-06 04:01:27
223.71.73.248 attackbots
$f2bV_matches
2020-04-06 03:35:39

Recently Reported IPs

114.124.137.231 114.124.138.47 114.124.138.171 114.124.138.95
114.124.138.238 114.124.139.251 114.124.139.72 114.124.139.76
114.124.140.12 114.124.139.60 114.124.207.108 114.124.207.180
115.211.230.53 114.124.207.65 114.124.208.70 114.124.208.192
114.124.209.130 114.124.209.14 114.124.209.198 114.124.210.169