Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Philippines

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.104.153.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.104.153.139.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:22:42 CST 2022
;; MSG SIZE  rcvd: 108
Host info
139.153.104.124.in-addr.arpa domain name pointer 124.104.153.139.pldt.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.153.104.124.in-addr.arpa	name = 124.104.153.139.pldt.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.65.64.51 attack
Feb 20 22:49:21 lnxded64 sshd[28354]: Failed password for uucp from 41.65.64.51 port 37362 ssh2
Feb 20 22:49:21 lnxded64 sshd[28354]: Failed password for uucp from 41.65.64.51 port 37362 ssh2
2020-02-21 05:53:16
5.39.77.117 attack
Feb 20 22:46:57 sd-53420 sshd\[8004\]: Invalid user at from 5.39.77.117
Feb 20 22:46:57 sd-53420 sshd\[8004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117
Feb 20 22:46:59 sd-53420 sshd\[8004\]: Failed password for invalid user at from 5.39.77.117 port 56258 ssh2
Feb 20 22:48:53 sd-53420 sshd\[8202\]: Invalid user rabbitmq from 5.39.77.117
Feb 20 22:48:53 sd-53420 sshd\[8202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117
...
2020-02-21 06:11:18
14.143.250.218 attackbotsspam
www noscript
...
2020-02-21 06:13:04
117.239.69.117 attack
Feb 20 22:49:12 MK-Soft-Root2 sshd[19087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.239.69.117 
Feb 20 22:49:13 MK-Soft-Root2 sshd[19087]: Failed password for invalid user informix from 117.239.69.117 port 41318 ssh2
...
2020-02-21 06:00:09
190.153.63.203 attackspam
Unauthorized connection attempt detected from IP address 190.153.63.203 to port 26
2020-02-21 06:15:39
218.92.0.175 attackbotsspam
Feb 20 21:53:54 localhost sshd\[17405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Feb 20 21:53:56 localhost sshd\[17405\]: Failed password for root from 218.92.0.175 port 1972 ssh2
Feb 20 21:53:59 localhost sshd\[17405\]: Failed password for root from 218.92.0.175 port 1972 ssh2
Feb 20 21:54:03 localhost sshd\[17405\]: Failed password for root from 218.92.0.175 port 1972 ssh2
Feb 20 21:54:06 localhost sshd\[17405\]: Failed password for root from 218.92.0.175 port 1972 ssh2
...
2020-02-21 06:05:58
60.168.128.2 attackbotsspam
Feb 20 16:48:54 Tower sshd[25025]: Connection from 60.168.128.2 port 54728 on 192.168.10.220 port 22 rdomain ""
Feb 20 16:48:56 Tower sshd[25025]: Invalid user qichen from 60.168.128.2 port 54728
Feb 20 16:48:56 Tower sshd[25025]: error: Could not get shadow information for NOUSER
Feb 20 16:48:56 Tower sshd[25025]: Failed password for invalid user qichen from 60.168.128.2 port 54728 ssh2
Feb 20 16:48:56 Tower sshd[25025]: Received disconnect from 60.168.128.2 port 54728:11: Bye Bye [preauth]
Feb 20 16:48:56 Tower sshd[25025]: Disconnected from invalid user qichen 60.168.128.2 port 54728 [preauth]
2020-02-21 06:02:50
128.199.184.196 attackbots
Feb 20 16:49:14 plusreed sshd[11169]: Invalid user fdy from 128.199.184.196
Feb 20 16:49:14 plusreed sshd[11169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.184.196
Feb 20 16:49:14 plusreed sshd[11169]: Invalid user fdy from 128.199.184.196
Feb 20 16:49:16 plusreed sshd[11169]: Failed password for invalid user fdy from 128.199.184.196 port 59603 ssh2
...
2020-02-21 05:56:59
185.150.190.103 attackbots
firewall-block, port(s): 60001/tcp
2020-02-21 06:07:05
200.89.174.205 attackspam
Feb 20 18:43:14 vps46666688 sshd[23398]: Failed password for sys from 200.89.174.205 port 36694 ssh2
...
2020-02-21 06:13:20
61.140.177.204 attackspam
Lines containing failures of 61.140.177.204 (max 1000)
Feb 20 13:14:40 localhost sshd[28896]: Invalid user em3-user from 61.140.177.204 port 54322
Feb 20 13:14:40 localhost sshd[28896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.177.204 
Feb 20 13:14:42 localhost sshd[28896]: Failed password for invalid user em3-user from 61.140.177.204 port 54322 ssh2
Feb 20 13:14:44 localhost sshd[28896]: Received disconnect from 61.140.177.204 port 54322:11: Bye Bye [preauth]
Feb 20 13:14:44 localhost sshd[28896]: Disconnected from invalid user em3-user 61.140.177.204 port 54322 [preauth]
Feb 20 13:38:42 localhost sshd[32597]: Invalid user ghostname from 61.140.177.204 port 43304
Feb 20 13:38:42 localhost sshd[32597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.177.204 
Feb 20 13:38:44 localhost sshd[32597]: Failed password for invalid user ghostname from 61.140.177.204 port 43304 ss........
------------------------------
2020-02-21 06:14:58
46.98.42.7 attackbots
Honeypot attack, port: 445, PTR: 7.42.PPPoE.fregat.ua.
2020-02-21 05:47:37
162.243.131.220 attack
Unauthorized connection attempt detected from IP address 162.243.131.220 to port 465
2020-02-21 06:01:41
41.58.181.234 attackspam
Feb 20 21:46:24 vlre-nyc-1 sshd\[6743\]: Invalid user odoo from 41.58.181.234
Feb 20 21:46:24 vlre-nyc-1 sshd\[6743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.58.181.234
Feb 20 21:46:26 vlre-nyc-1 sshd\[6743\]: Failed password for invalid user odoo from 41.58.181.234 port 34544 ssh2
Feb 20 21:49:26 vlre-nyc-1 sshd\[6815\]: Invalid user confluence from 41.58.181.234
Feb 20 21:49:26 vlre-nyc-1 sshd\[6815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.58.181.234
...
2020-02-21 05:50:44
60.244.155.21 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-21 05:49:01

Recently Reported IPs

124.105.196.78 124.105.196.167 124.105.200.176 124.104.167.244
124.105.204.188 124.105.197.96 124.105.89.195 124.106.134.11
124.106.17.191 124.105.29.200 124.106.181.56 124.106.222.107
124.107.173.77 124.109.35.73 124.107.251.58 124.105.224.71
124.11.208.8 124.114.255.12 124.114.178.10 124.115.231.194