Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.137.108.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.137.108.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:36:27 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 148.108.137.124.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 148.108.137.124.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.14.224.106 attackspambots
Sep 14 07:03:30 itachi1706steam sshd[29824]: Did not receive identification string from 45.14.224.106 port 33962
Sep 14 07:03:47 itachi1706steam sshd[29879]: Disconnected from authenticating user root 45.14.224.106 port 46428 [preauth]
...
2020-09-14 07:09:58
189.240.62.227 attack
Sep 14 01:02:41 router sshd[20372]: Failed password for root from 189.240.62.227 port 47760 ssh2
Sep 14 01:10:57 router sshd[20421]: Failed password for root from 189.240.62.227 port 52802 ssh2
...
2020-09-14 07:16:22
134.119.206.3 attackbots
2020-09-13T18:30:30.206949devel sshd[15582]: Failed password for root from 134.119.206.3 port 50766 ssh2
2020-09-13T18:34:04.141844devel sshd[15854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.119.206.3  user=root
2020-09-13T18:34:06.046622devel sshd[15854]: Failed password for root from 134.119.206.3 port 36410 ssh2
2020-09-14 07:08:38
49.232.166.190 attack
Sep 13 15:43:59 propaganda sshd[36017]: Connection from 49.232.166.190 port 49690 on 10.0.0.161 port 22 rdomain ""
Sep 13 15:44:00 propaganda sshd[36017]: Connection closed by 49.232.166.190 port 49690 [preauth]
2020-09-14 07:13:21
128.199.102.242 attack
Sep 14 00:41:49 ns382633 sshd\[6339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.242  user=root
Sep 14 00:41:51 ns382633 sshd\[6339\]: Failed password for root from 128.199.102.242 port 56880 ssh2
Sep 14 00:57:07 ns382633 sshd\[9324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.242  user=root
Sep 14 00:57:09 ns382633 sshd\[9324\]: Failed password for root from 128.199.102.242 port 46536 ssh2
Sep 14 01:01:10 ns382633 sshd\[10170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.242  user=root
2020-09-14 07:35:47
145.239.29.217 attack
145.239.29.217 - - [13/Sep/2020:18:59:28 +0100] "POST /wp-login.php HTTP/1.1" 200 2401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [13/Sep/2020:18:59:29 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - [13/Sep/2020:18:59:29 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-14 07:38:29
144.34.216.182 attackbots
fail2ban detected bruce force on ssh iptables
2020-09-14 07:01:33
152.136.157.34 attackspambots
2020-09-13T19:23:51.584953ionos.janbro.de sshd[90495]: Invalid user tomcat from 152.136.157.34 port 48894
2020-09-13T19:23:52.994289ionos.janbro.de sshd[90495]: Failed password for invalid user tomcat from 152.136.157.34 port 48894 ssh2
2020-09-13T19:30:58.174103ionos.janbro.de sshd[90518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.157.34  user=root
2020-09-13T19:30:59.810111ionos.janbro.de sshd[90518]: Failed password for root from 152.136.157.34 port 45714 ssh2
2020-09-13T19:52:03.454883ionos.janbro.de sshd[90621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.157.34  user=root
2020-09-13T19:52:05.719078ionos.janbro.de sshd[90621]: Failed password for root from 152.136.157.34 port 36174 ssh2
2020-09-13T19:58:57.952555ionos.janbro.de sshd[90678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.157.34  user=root
2020-09-13T19:58:59.7153
...
2020-09-14 07:32:51
116.74.23.83 attackbots
IP 116.74.23.83 attacked honeypot on port: 23 at 9/13/2020 9:55:48 AM
2020-09-14 07:05:56
192.42.116.16 attack
$f2bV_matches
2020-09-14 07:28:04
51.38.32.230 attackbots
Sep 13 23:56:54 ns382633 sshd\[30110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.32.230  user=root
Sep 13 23:56:57 ns382633 sshd\[30110\]: Failed password for root from 51.38.32.230 port 51534 ssh2
Sep 14 00:05:45 ns382633 sshd\[31923\]: Invalid user toribio from 51.38.32.230 port 51030
Sep 14 00:05:45 ns382633 sshd\[31923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.32.230
Sep 14 00:05:46 ns382633 sshd\[31923\]: Failed password for invalid user toribio from 51.38.32.230 port 51030 ssh2
2020-09-14 07:24:52
111.229.76.239 attackbots
Brute%20Force%20SSH
2020-09-14 07:31:02
51.91.157.101 attackspam
Sep 13 19:29:13 rocket sshd[10716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101
Sep 13 19:29:15 rocket sshd[10716]: Failed password for invalid user csgoserver from 51.91.157.101 port 35002 ssh2
...
2020-09-14 07:27:49
87.226.165.143 attackspam
Sep 13 22:01:37 scw-tender-jepsen sshd[12380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.226.165.143
Sep 13 22:01:39 scw-tender-jepsen sshd[12380]: Failed password for invalid user sasano from 87.226.165.143 port 34346 ssh2
2020-09-14 07:27:20
123.155.154.204 attackspam
2020-09-13T10:08:55.969198correo.[domain] sshd[41087]: Failed password for root from 123.155.154.204 port 38669 ssh2 2020-09-13T10:29:59.146922correo.[domain] sshd[43215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.155.154.204 user=root 2020-09-13T10:30:00.925107correo.[domain] sshd[43215]: Failed password for root from 123.155.154.204 port 47315 ssh2 ...
2020-09-14 07:14:44

Recently Reported IPs

42.245.234.213 143.68.212.15 173.191.165.3 249.203.186.168
146.232.105.66 62.164.188.161 61.162.47.53 88.54.64.52
87.179.28.154 197.138.49.13 161.176.113.73 128.53.109.166
254.104.22.243 144.73.183.79 240.111.160.223 54.239.206.124
78.228.1.77 138.164.114.75 130.48.197.96 134.134.179.63