Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.126.7.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.126.7.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:57:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
139.7.126.124.in-addr.arpa domain name pointer 139.7.126.124.broad.bjtelecom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.7.126.124.in-addr.arpa	name = 139.7.126.124.broad.bjtelecom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.63.253.200 normal
IP Normal
2021-02-04 00:52:22
154.28.188.156 normal
... hat auch 2 x versucht auf das admin-Konto zuzugreifen
2021-02-10 05:04:50
23.247.75.104 spamattack
PHISHING AND SPAM ATTACK
FROM "Speechelo - Speechelo@speechgrow.cyou -" : 
SUBJECT "HEAR THIS: Create ‘Human’ Voice-Overs " :
RECEIVED "rom prosos.royaguage.com ([23.247.75.104]:37489 helo=papa.speechgrow.cyou) " :
DATE/TIMESENT "Tue, 23 Feb 2021 01:07:20 "
2021-02-23 04:28:29
69.65.62.34 spamattack
PHISHING AND SPAM ATTACK
FROM "123Greetings - specials@123g.biz -" : 
SUBJECT "This Firefighter's Secret Relaxes Blood Pressure" :
RECEIVED "from mail.silver34.123g.biz ([69.65.62.34]:56103) " :
DATE/TIMESENT "Sat, 20 Feb 2021 09:30:30 "

NOTE pretending to be 123Greetings.com
2021-02-21 07:48:40
66.70.235.27 normal
09014863832
2021-02-15 04:32:12
154.28.188.147 attacknormal
Tries to login to admin of QNAP NAS many times
2021-01-21 16:05:53
78.99.34.59 normal
its a normal IP
2021-02-08 05:40:26
192.187.37.94 attackproxy
192.187.37.94
2021-01-18 20:34:31
66.70.235.27 normal
09014863832
2021-02-15 13:47:46
136.228.175.181 spamattacknormal
Kh
2021-01-17 21:59:07
189.252.136.122 attack
Identity thief 
Fraud orders
Fraud pattern/MO established
2021-01-18 11:09:45
185.63.253.200 normal
Yy
2021-01-24 20:46:15
213.108.134.156 attack
PP2P Brute-Force, RDP Brute-Force
2021-01-27 16:31:27
23.228.115.5 spamattack
PHISHING AND SPAM ATTACK
FROM "Project Build Itself -ProjectBuildItself@savagegrow.cyou-" : 
SUBJECT "Make 16,000 Projects With Step By Step Plans" :
RECEIVED "from [23.228.115.5] (port=46524 helo=gull.savagegrow.cyou)" :
DATE/TIME SENT Sun, 21 Feb 2021 03:25:44
2021-02-21 07:27:21
124.158.112.70 spambotsattackproxynormal
Download program
2021-01-25 16:57:00

Recently Reported IPs

88.233.121.86 249.229.133.128 49.71.197.251 230.170.250.219
223.124.143.191 8.123.15.14 8.182.155.160 21.152.87.136
86.37.130.27 245.8.139.202 192.107.145.142 147.229.177.93
125.18.185.58 151.54.24.95 54.22.199.10 225.182.162.214
97.180.33.21 25.22.165.180 63.120.238.18 208.74.184.57