Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
118.99.124.26 attackspam
Email rejected due to spam filtering
2020-02-25 04:16:02
118.99.124.189 attack
SSH-bruteforce attempts
2020-01-20 15:50:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.99.124.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.99.124.157.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:41:08 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 157.124.99.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.124.99.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.211.104.34 attack
Nov 16 10:17:41 sauna sshd[30392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.104.34
Nov 16 10:17:43 sauna sshd[30392]: Failed password for invalid user !@#$%^ from 129.211.104.34 port 44898 ssh2
...
2019-11-16 17:32:54
217.76.40.82 attack
Nov 16 09:29:08 lnxweb62 sshd[12011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.76.40.82
2019-11-16 17:15:38
92.222.89.7 attackbots
Nov 16 08:46:35 SilenceServices sshd[331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.89.7
Nov 16 08:46:37 SilenceServices sshd[331]: Failed password for invalid user krieger from 92.222.89.7 port 57914 ssh2
Nov 16 08:50:23 SilenceServices sshd[1524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.89.7
2019-11-16 17:26:22
106.13.32.56 attackspam
Nov 15 23:39:51 sachi sshd\[17145\]: Invalid user squid from 106.13.32.56
Nov 15 23:39:51 sachi sshd\[17145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.56
Nov 15 23:39:53 sachi sshd\[17145\]: Failed password for invalid user squid from 106.13.32.56 port 48074 ssh2
Nov 15 23:44:45 sachi sshd\[17562\]: Invalid user trash1 from 106.13.32.56
Nov 15 23:44:45 sachi sshd\[17562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.56
2019-11-16 17:50:10
85.238.77.199 attackbots
Connection by 85.238.77.199 on port: 23 got caught by honeypot at 11/16/2019 5:25:36 AM
2019-11-16 17:30:29
189.112.207.49 attackbotsspam
2019-11-16T08:34:59.602593abusebot-2.cloudsearch.cf sshd\[13508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.207.49  user=ftp
2019-11-16 17:52:07
218.92.0.133 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Failed password for root from 218.92.0.133 port 61370 ssh2
Failed password for root from 218.92.0.133 port 61370 ssh2
Failed password for root from 218.92.0.133 port 61370 ssh2
Failed password for root from 218.92.0.133 port 61370 ssh2
2019-11-16 17:43:04
67.55.92.90 attackspambots
F2B blocked SSH bruteforcing
2019-11-16 17:56:56
122.155.108.130 attackbots
Nov 15 23:07:41 hanapaa sshd\[7005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.108.130  user=root
Nov 15 23:07:43 hanapaa sshd\[7005\]: Failed password for root from 122.155.108.130 port 44319 ssh2
Nov 15 23:12:15 hanapaa sshd\[7485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.108.130  user=root
Nov 15 23:12:18 hanapaa sshd\[7485\]: Failed password for root from 122.155.108.130 port 45580 ssh2
Nov 15 23:16:52 hanapaa sshd\[7842\]: Invalid user klark from 122.155.108.130
2019-11-16 17:19:51
209.17.96.42 attack
209.17.96.42 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1026,50070,502,111. Incident counter (4h, 24h, all-time): 5, 28, 365
2019-11-16 17:23:55
151.73.108.190 attackspam
Automatic report - Port Scan Attack
2019-11-16 17:28:23
106.251.118.123 attackbots
$f2bV_matches
2019-11-16 17:43:58
187.114.43.249 attackbots
Unauthorised access (Nov 16) SRC=187.114.43.249 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=15184 TCP DPT=23 WINDOW=1218 SYN
2019-11-16 17:23:25
130.162.66.249 attack
Nov 15 22:47:30 kapalua sshd\[23690\]: Invalid user patsourellis from 130.162.66.249
Nov 15 22:47:30 kapalua sshd\[23690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-66-249.compute.oraclecloud.com
Nov 15 22:47:32 kapalua sshd\[23690\]: Failed password for invalid user patsourellis from 130.162.66.249 port 50500 ssh2
Nov 15 22:51:37 kapalua sshd\[24079\]: Invalid user 116729 from 130.162.66.249
Nov 15 22:51:37 kapalua sshd\[24079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-130-162-66-249.compute.oraclecloud.com
2019-11-16 17:26:02
77.247.110.58 attackbotsspam
11/16/2019-03:55:03.643846 77.247.110.58 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 75
2019-11-16 17:37:24

Recently Reported IPs

116.115.19.99 118.99.124.158 118.99.124.164 118.99.124.160
118.99.124.16 118.99.124.166 118.99.124.168 118.99.124.170
118.99.124.171 118.99.124.172 118.99.124.174 118.99.124.176
116.115.35.237 118.99.124.179 118.99.124.18 118.99.124.180
118.99.124.182 118.99.124.188 118.99.124.184 118.99.124.192