Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.122.55.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35856
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.122.55.118.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 11:14:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
118.55.122.124.in-addr.arpa domain name pointer ppp-124-122-55-118.revip2.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.55.122.124.in-addr.arpa	name = ppp-124-122-55-118.revip2.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.68.203.63 attack
Telnetd brute force attack detected by fail2ban
2019-11-16 15:05:07
193.194.69.99 attack
Nov 16 07:29:09 dedicated sshd[2384]: Invalid user allthebest from 193.194.69.99 port 38548
2019-11-16 15:21:10
78.188.59.87 attackbotsspam
Honeypot attack, port: 23, PTR: 78.188.59.87.static.ttnet.com.tr.
2019-11-16 15:02:06
51.15.51.2 attack
Nov 15 20:22:03 kapalua sshd\[10954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2  user=bin
Nov 15 20:22:05 kapalua sshd\[10954\]: Failed password for bin from 51.15.51.2 port 58304 ssh2
Nov 15 20:26:02 kapalua sshd\[11318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2  user=lp
Nov 15 20:26:04 kapalua sshd\[11318\]: Failed password for lp from 51.15.51.2 port 38782 ssh2
Nov 15 20:29:59 kapalua sshd\[11627\]: Invalid user centos from 51.15.51.2
2019-11-16 14:45:10
118.41.11.46 attackbots
F2B blocked SSH bruteforcing
2019-11-16 15:19:41
176.110.57.27 attack
Honeypot attack, port: 23, PTR: host-176-110-57-27.la.net.ua.
2019-11-16 15:00:02
138.197.89.186 attackspambots
[Aegis] @ 2019-11-16 05:54:29  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-11-16 14:25:18
222.186.180.6 attackspam
Nov 16 07:32:23 SilenceServices sshd[10338]: Failed password for root from 222.186.180.6 port 33112 ssh2
Nov 16 07:32:27 SilenceServices sshd[10338]: Failed password for root from 222.186.180.6 port 33112 ssh2
Nov 16 07:32:37 SilenceServices sshd[10338]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 33112 ssh2 [preauth]
2019-11-16 14:42:32
106.12.178.246 attack
Nov 16 07:29:08 jane sshd[11320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.246 
Nov 16 07:29:10 jane sshd[11320]: Failed password for invalid user P@$$W0RD2019 from 106.12.178.246 port 45678 ssh2
...
2019-11-16 15:20:40
2002:42eb:a933::42eb:a933 attack
scanning for potential vulnerable apps (wordpress etc.) and database accesses. Requested URI: /wp-login.php
2019-11-16 15:01:45
222.186.175.155 attackbots
Nov 16 08:04:31 rotator sshd\[4637\]: Failed password for root from 222.186.175.155 port 50600 ssh2Nov 16 08:04:34 rotator sshd\[4637\]: Failed password for root from 222.186.175.155 port 50600 ssh2Nov 16 08:04:37 rotator sshd\[4637\]: Failed password for root from 222.186.175.155 port 50600 ssh2Nov 16 08:04:40 rotator sshd\[4637\]: Failed password for root from 222.186.175.155 port 50600 ssh2Nov 16 08:04:44 rotator sshd\[4637\]: Failed password for root from 222.186.175.155 port 50600 ssh2Nov 16 08:04:51 rotator sshd\[4640\]: Failed password for root from 222.186.175.155 port 6956 ssh2
...
2019-11-16 15:08:17
107.189.11.148 attack
3389BruteforceFW21
2019-11-16 15:16:04
51.38.33.178 attackspambots
Nov 15 20:53:56 hpm sshd\[1210\]: Invalid user guest from 51.38.33.178
Nov 15 20:53:56 hpm sshd\[1210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-38-33.eu
Nov 15 20:53:59 hpm sshd\[1210\]: Failed password for invalid user guest from 51.38.33.178 port 47864 ssh2
Nov 15 20:57:34 hpm sshd\[1525\]: Invalid user jareld from 51.38.33.178
Nov 15 20:57:34 hpm sshd\[1525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-51-38-33.eu
2019-11-16 15:17:52
144.217.214.13 attack
SSH bruteforce
2019-11-16 14:52:31
42.230.70.12 attackspambots
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-11-16 15:04:42

Recently Reported IPs

124.122.55.113 124.122.55.122 124.122.55.124 124.122.55.126
124.122.55.132 124.122.55.14 124.122.55.140 124.122.55.158
124.122.55.159 124.122.55.162 124.122.55.177 124.122.55.193
124.122.55.194 124.122.55.198 124.122.55.202 124.122.55.209
124.122.55.212 124.122.55.214 124.122.55.218 124.122.55.245