Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Auckland

Region: Auckland

Country: New Zealand

Internet Service Provider: Spark New Zealand Trading Ltd

Hostname: unknown

Organization: unknown

Usage Type: Mobile ISP

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt from IP address 122.56.100.247 on Port 445(SMB)
2020-05-02 05:16:53
attack
Unauthorized connection attempt from IP address 122.56.100.247 on Port 445(SMB)
2020-04-20 00:33:15
attack
Unauthorized connection attempt from IP address 122.56.100.247 on Port 445(SMB)
2020-02-19 06:13:13
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.56.100.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;122.56.100.247.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021803 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 06:13:10 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 247.100.56.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.100.56.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.181.10.232 attackspam
Unauthorized connection attempt from IP address 2.181.10.232 on Port 445(SMB)
2019-07-22 18:51:46
125.165.134.37 attackspambots
Unauthorised access (Jul 22) SRC=125.165.134.37 LEN=52 TTL=248 ID=11585 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-22 19:16:29
87.255.200.100 attack
Unauthorized connection attempt from IP address 87.255.200.100 on Port 445(SMB)
2019-07-22 19:22:22
181.164.107.226 attack
Jul 21 23:53:17 plusreed sshd[30615]: Invalid user agnes from 181.164.107.226
...
2019-07-22 19:10:19
113.161.220.150 attackspam
Unauthorized connection attempt from IP address 113.161.220.150 on Port 445(SMB)
2019-07-22 19:22:56
183.80.10.17 attackspambots
Unauthorized connection attempt from IP address 183.80.10.17 on Port 445(SMB)
2019-07-22 18:56:02
177.126.232.191 attackbotsspam
Unauthorized connection attempt from IP address 177.126.232.191 on Port 587(SMTP-MSA)
2019-07-22 19:25:03
113.160.140.29 attack
Unauthorized connection attempt from IP address 113.160.140.29 on Port 445(SMB)
2019-07-22 18:59:58
177.39.84.130 attack
Jul 22 11:38:36 debian sshd\[1033\]: Invalid user abner from 177.39.84.130 port 42051
Jul 22 11:38:36 debian sshd\[1033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.39.84.130
...
2019-07-22 18:53:38
125.161.136.106 attackspambots
Unauthorized connection attempt from IP address 125.161.136.106 on Port 445(SMB)
2019-07-22 19:20:04
42.112.66.20 attack
Unauthorized connection attempt from IP address 42.112.66.20 on Port 445(SMB)
2019-07-22 19:05:03
104.227.2.141 attackbotsspam
[portscan] Port scan
2019-07-22 18:50:41
59.127.33.102 attack
Honeypot attack, port: 81, PTR: 59-127-33-102.HINET-IP.hinet.net.
2019-07-22 19:06:01
132.232.39.15 attackspam
Jul 22 11:01:39 MK-Soft-VM4 sshd\[11879\]: Invalid user sm from 132.232.39.15 port 42434
Jul 22 11:01:39 MK-Soft-VM4 sshd\[11879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.39.15
Jul 22 11:01:41 MK-Soft-VM4 sshd\[11879\]: Failed password for invalid user sm from 132.232.39.15 port 42434 ssh2
...
2019-07-22 19:03:38
121.142.111.214 attackspambots
Unauthorized SSH login attempts
2019-07-22 19:01:20

Recently Reported IPs

117.83.132.133 84.239.207.69 221.228.17.72 95.221.54.92
153.163.204.213 207.23.200.109 189.187.148.16 36.231.203.140
24.140.81.142 187.255.76.77 186.74.58.113 193.151.76.165
187.114.144.105 197.194.27.245 180.251.128.223 123.247.248.169
92.193.205.226 213.16.184.145 120.80.169.242 194.35.233.31