Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: Tencent Cloud Computing (Beijing) Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 124.156.55.107:45365 -> port 1098, len 44
2020-09-13 20:09:08
attack
[Sun Sep 06 16:40:46 2020] - DDoS Attack From IP: 124.156.55.107 Port: 48380
2020-09-13 12:01:58
attackspambots
firewall-block, port(s): 88/udp
2020-09-13 03:51:44
attack
unauthorized connection attempt
2020-01-28 13:17:48
attack
Unauthorized connection attempt detected from IP address 124.156.55.107 to port 3075 [J]
2020-01-19 05:58:41
attackspambots
Unauthorized connection attempt detected from IP address 124.156.55.107 to port 8000 [J]
2020-01-12 15:04:56
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 00:38:15
attackbotsspam
8009/tcp 13722/tcp 8890/tcp...
[2019-08-02/10-01]12pkt,11pt.(tcp),1pt.(udp)
2019-10-02 03:43:20
Comments on same subnet:
IP Type Details Datetime
124.156.55.181 attackspambots
623/tcp 25000/tcp 5986/tcp...
[2020-08-13/10-07]9pkt,9pt.(tcp)
2020-10-09 03:19:36
124.156.55.181 attack
623/tcp 25000/tcp 5986/tcp...
[2020-08-13/10-07]9pkt,9pt.(tcp)
2020-10-08 19:24:06
124.156.55.167 attack
Fail2Ban Ban Triggered
2020-09-29 00:24:24
124.156.55.167 attackbotsspam
Fail2Ban Ban Triggered
2020-09-28 16:26:20
124.156.55.21 attackbots
 TCP (SYN) 124.156.55.21:53865 -> port 8085, len 44
2020-09-21 02:29:44
124.156.55.21 attackspam
Found on   CINS badguys     / proto=17  .  srcport=55865  .  dstport=161  .     (2282)
2020-09-20 18:30:34
124.156.55.20 attackbotsspam
port scan and connect, tcp 143 (imap)
2020-09-07 22:25:32
124.156.55.20 attackbots
port scan and connect, tcp 143 (imap)
2020-09-07 14:07:30
124.156.55.20 attackbots
port scan and connect, tcp 143 (imap)
2020-09-07 06:40:50
124.156.55.21 attack
8881/tcp 16992/tcp 7145/tcp...
[2020-07-06/08-13]7pkt,6pt.(tcp),1pt.(udp)
2020-08-14 18:39:35
124.156.55.167 attackspambots
[Thu Jul 02 12:49:19 2020] - DDoS Attack From IP: 124.156.55.167 Port: 46640
2020-08-12 01:56:01
124.156.55.222 attackspam
Unauthorized connection attempt detected from IP address 124.156.55.222 to port 389
2020-07-25 21:23:24
124.156.55.36 attack
Unauthorized connection attempt detected from IP address 124.156.55.36 to port 4000
2020-07-25 20:33:28
124.156.55.67 attack
Jul 23 05:58:38 debian-2gb-nbg1-2 kernel: \[17735244.880248\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=124.156.55.67 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=TCP SPT=41307 DPT=135 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-23 13:05:31
124.156.55.205 attackbots
623/udp 3280/tcp 47808/udp...
[2020-05-10/07-11]8pkt,5pt.(tcp),3pt.(udp)
2020-07-11 15:37:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.156.55.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.156.55.107.			IN	A

;; AUTHORITY SECTION:
.			495	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100102 1800 900 604800 86400

;; Query time: 694 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 02 03:43:17 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 107.55.156.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.55.156.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.228.163.114 attackspam
Unauthorized connection attempt detected from IP address 41.228.163.114 to port 445
2020-06-22 06:56:10
93.69.81.221 attackbotsspam
Unauthorized connection attempt detected from IP address 93.69.81.221 to port 2323
2020-06-22 07:09:58
200.166.237.230 attackbotsspam
Unauthorized connection attempt detected from IP address 200.166.237.230 to port 445
2020-06-22 07:00:40
199.212.57.244 attackbotsspam
Unauthorized connection attempt detected from IP address 199.212.57.244 to port 3001
2020-06-22 07:00:55
46.59.24.123 attackspam
Unauthorized connection attempt detected from IP address 46.59.24.123 to port 23
2020-06-22 07:16:12
49.51.252.116 attackspam
[Sat Jun 13 12:47:15 2020] - DDoS Attack From IP: 49.51.252.116 Port: 57851
2020-06-22 07:15:52
77.42.72.68 attack
Unauthorized connection attempt detected from IP address 77.42.72.68 to port 23
2020-06-22 06:51:47
61.153.249.186 attackbots
Unauthorized connection attempt detected from IP address 61.153.249.186 to port 1433
2020-06-22 07:13:58
75.148.118.179 attackbots
Unauthorized connection attempt detected from IP address 75.148.118.179 to port 23
2020-06-22 07:12:32
190.148.52.153 attack
Unauthorized connection attempt detected from IP address 190.148.52.153 to port 5900
2020-06-22 07:22:12
185.218.160.88 attackspambots
Unauthorized connection attempt detected from IP address 185.218.160.88 to port 23
2020-06-22 07:23:21
68.129.201.141 attack
Unauthorized connection attempt detected from IP address 68.129.201.141 to port 23
2020-06-22 07:12:47
2.179.106.160 attackspambots
Unauthorized connection attempt detected from IP address 2.179.106.160 to port 8080
2020-06-22 06:57:25
69.204.236.142 attackbotsspam
Unauthorized connection attempt detected from IP address 69.204.236.142 to port 81
2020-06-22 06:52:03
167.250.160.184 attackbots
Unauthorized connection attempt detected from IP address 167.250.160.184 to port 80
2020-06-22 07:06:30

Recently Reported IPs

197.47.21.216 101.15.119.120 49.34.7.144 154.156.105.85
189.187.68.65 199.127.61.68 107.9.0.215 157.56.124.233
68.213.223.98 193.201.185.127 161.226.186.125 83.13.208.170
165.225.72.224 196.73.187.111 148.240.198.254 49.42.102.197
163.215.250.199 44.231.110.30 41.201.60.129 219.48.203.215