Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.162.149.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.162.149.245.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 23:35:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 245.149.162.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.149.162.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.174.93.72 attackspambots
TCP Port Scanning
2019-12-28 03:05:57
162.253.224.8 attackbots
xmlrpc attack
2019-12-28 03:18:51
222.186.180.6 attackbotsspam
--- report ---
Dec 27 16:17:44 sshd: Connection from 222.186.180.6 port 43014
2019-12-28 03:29:47
119.29.197.54 attackbotsspam
$f2bV_matches
2019-12-28 03:00:21
217.77.215.234 attackspam
firewall-block, port(s): 8000/tcp
2019-12-28 02:59:18
210.177.54.141 attack
Dec 27 20:02:27 MK-Soft-Root1 sshd[16065]: Failed password for root from 210.177.54.141 port 54468 ssh2
...
2019-12-28 03:17:54
1.188.199.157 attack
Fail2Ban Ban Triggered
2019-12-28 02:56:01
41.221.168.167 attack
Dec 27 18:32:33 srv206 sshd[16244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167  user=root
Dec 27 18:32:35 srv206 sshd[16244]: Failed password for root from 41.221.168.167 port 51639 ssh2
...
2019-12-28 03:08:40
187.95.124.230 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-12-28 03:12:24
117.50.126.4 attackspam
SIP/5060 Probe, BF, Hack -
2019-12-28 02:54:03
31.145.101.250 attackspam
Unauthorised access (Dec 27) SRC=31.145.101.250 LEN=52 TTL=112 ID=25416 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-28 03:23:34
182.43.175.99 attackbots
SSH/22 MH Probe, BF, Hack -
2019-12-28 03:22:28
46.147.193.169 attackbotsspam
Dec 27 16:01:07 legacy sshd[6100]: Failed password for root from 46.147.193.169 port 57236 ssh2
Dec 27 16:04:15 legacy sshd[6159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.147.193.169
Dec 27 16:04:16 legacy sshd[6159]: Failed password for invalid user naini from 46.147.193.169 port 56470 ssh2
...
2019-12-28 02:53:46
89.40.126.224 attackspambots
SPAM Delivery Attempt
2019-12-28 02:51:05
117.50.5.94 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 02:52:24

Recently Reported IPs

110.248.86.226 69.240.6.56 128.89.160.35 23.211.238.44
213.48.113.190 143.232.72.217 237.80.205.76 164.91.149.192
199.32.121.38 32.29.36.91 196.143.251.237 55.24.120.146
203.197.66.240 49.176.176.132 180.24.201.214 250.83.211.33
221.78.254.134 252.3.27.184 17.196.135.24 8.113.12.32