Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Suita

Region: Osaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.145.106.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.145.106.120.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 20:59:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
120.106.145.124.in-addr.arpa domain name pointer 124-145-106-120.rev.home.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.106.145.124.in-addr.arpa	name = 124-145-106-120.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.99.216.205 attackbots
DATE:2020-05-23 00:19:34, IP:210.99.216.205, PORT:ssh SSH brute force auth (docker-dc)
2020-05-23 06:52:24
140.143.200.251 attackspambots
Invalid user dyz from 140.143.200.251 port 35068
2020-05-23 06:46:06
185.176.27.182 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-05-23 06:51:15
185.107.80.62 attackspam
Fail2Ban Ban Triggered
2020-05-23 06:23:56
103.145.12.132 attackspambots
SIP INVITE Flooding
2020-05-23 06:52:04
195.191.250.25 attackbotsspam
22.05.2020 23:13:19 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-05-23 06:21:11
104.198.155.237 attack
xmlrpc attack
2020-05-23 06:35:25
50.235.176.173 attackspambots
Unauthorized connection attempt from IP address 50.235.176.173 on Port 445(SMB)
2020-05-23 06:36:33
85.132.106.117 attack
2020-05-23 06:15:40
49.88.112.67 attackspambots
May 22 19:34:29 dns1 sshd[8650]: Failed password for root from 49.88.112.67 port 10632 ssh2
May 22 19:34:33 dns1 sshd[8650]: Failed password for root from 49.88.112.67 port 10632 ssh2
May 22 19:34:37 dns1 sshd[8650]: Failed password for root from 49.88.112.67 port 10632 ssh2
2020-05-23 06:39:08
87.138.254.133 attackspam
Invalid user kak from 87.138.254.133 port 57166
2020-05-23 06:25:09
104.248.115.254 attack
timhelmke.de 104.248.115.254 [16/May/2020:23:26:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5987 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
timhelmke.de 104.248.115.254 [16/May/2020:23:26:48 +0200] "POST /wp-login.php HTTP/1.1" 200 5941 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-23 06:28:11
109.248.88.220 attackbotsspam
Port probing on unauthorized port 445
2020-05-23 06:47:49
106.13.52.83 attackbots
SSH Invalid Login
2020-05-23 06:34:35
5.101.0.209 attackspam
Brute force attack stopped by firewall
2020-05-23 06:53:23

Recently Reported IPs

122.92.139.133 124.113.221.241 117.9.95.84 121.220.103.39
115.92.125.188 115.91.102.88 116.135.186.17 115.109.115.102
115.246.203.109 115.205.221.67 115.77.97.22 114.25.163.48
43.143.241.67 111.148.228.76 111.127.80.146 113.78.26.76
110.114.222.189 110.200.72.200 110.100.248.223 11.3.165.71