Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yingxian

Region: Shanxi

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: CHINA UNICOM China169 Backbone

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.164.172.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15735
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.164.172.242.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072700 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 01:09:38 CST 2019
;; MSG SIZE  rcvd: 119
Host info
242.172.164.124.in-addr.arpa domain name pointer 242.172.164.124.adsl-pool.sx.cn.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
242.172.164.124.in-addr.arpa	name = 242.172.164.124.adsl-pool.sx.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.143.223.254 attackbots
port
2020-06-04 01:10:59
84.92.92.196 attack
(sshd) Failed SSH login from 84.92.92.196 (GB/United Kingdom/dleaseomnibus.pndsl.co.uk): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  3 18:11:10 ubnt-55d23 sshd[13987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.92.92.196  user=root
Jun  3 18:11:12 ubnt-55d23 sshd[13987]: Failed password for root from 84.92.92.196 port 46630 ssh2
2020-06-04 01:09:29
144.76.29.148 attackspambots
20 attempts against mh-misbehave-ban on wave
2020-06-04 01:11:35
160.153.147.140 attackbots
Automatic report - XMLRPC Attack
2020-06-04 01:08:51
51.132.9.143 attackbots
Brute forcing email accounts
2020-06-04 00:42:20
217.153.229.226 attackbots
Jun  3 16:04:15 localhost sshd[95479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
Jun  3 16:04:17 localhost sshd[95479]: Failed password for root from 217.153.229.226 port 60164 ssh2
Jun  3 16:08:03 localhost sshd[95819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
Jun  3 16:08:05 localhost sshd[95819]: Failed password for root from 217.153.229.226 port 38476 ssh2
Jun  3 16:11:52 localhost sshd[96181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.153.229.226  user=root
Jun  3 16:11:54 localhost sshd[96181]: Failed password for root from 217.153.229.226 port 48766 ssh2
...
2020-06-04 00:40:49
222.186.42.7 attackbots
Jun  3 18:40:45 MainVPS sshd[18223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:40:46 MainVPS sshd[18223]: Failed password for root from 222.186.42.7 port 10998 ssh2
Jun  3 18:40:53 MainVPS sshd[18504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:40:55 MainVPS sshd[18504]: Failed password for root from 222.186.42.7 port 49785 ssh2
Jun  3 18:41:03 MainVPS sshd[18578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Jun  3 18:41:05 MainVPS sshd[18578]: Failed password for root from 222.186.42.7 port 24379 ssh2
...
2020-06-04 00:43:48
39.41.104.21 attackspam
Automatic report - XMLRPC Attack
2020-06-04 00:35:54
107.170.135.29 attack
SSH invalid-user multiple login attempts
2020-06-04 01:14:10
122.51.22.134 attackbotsspam
2020-06-03T10:19:25.632122linuxbox-skyline sshd[113744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.22.134  user=root
2020-06-03T10:19:27.164051linuxbox-skyline sshd[113744]: Failed password for root from 122.51.22.134 port 41852 ssh2
...
2020-06-04 00:53:55
122.51.227.65 attackbotsspam
Jun  3 14:06:44 tuxlinux sshd[9720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
Jun  3 14:06:45 tuxlinux sshd[9720]: Failed password for root from 122.51.227.65 port 58684 ssh2
Jun  3 14:06:44 tuxlinux sshd[9720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
Jun  3 14:06:45 tuxlinux sshd[9720]: Failed password for root from 122.51.227.65 port 58684 ssh2
Jun  3 14:17:48 tuxlinux sshd[10053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.227.65  user=root
...
2020-06-04 01:05:34
139.217.233.15 attack
Lines containing failures of 139.217.233.15 (max 1000)
Jun  1 12:34:50 archiv sshd[26031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.233.15  user=r.r
Jun  1 12:34:52 archiv sshd[26031]: Failed password for r.r from 139.217.233.15 port 36296 ssh2
Jun  1 12:34:53 archiv sshd[26031]: Received disconnect from 139.217.233.15 port 36296:11: Bye Bye [preauth]
Jun  1 12:34:53 archiv sshd[26031]: Disconnected from 139.217.233.15 port 36296 [preauth]
Jun  1 12:41:33 archiv sshd[26136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.233.15  user=r.r
Jun  1 12:41:35 archiv sshd[26136]: Failed password for r.r from 139.217.233.15 port 37232 ssh2
Jun  1 12:41:35 archiv sshd[26136]: Received disconnect from 139.217.233.15 port 37232:11: Bye Bye [preauth]
Jun  1 12:41:35 archiv sshd[26136]: Disconnected from 139.217.233.15 port 37232 [preauth]
Jun  1 12:45:26 archiv sshd[26226]: pam_un........
------------------------------
2020-06-04 01:14:59
195.54.160.166 attackspam
 TCP (SYN) 195.54.160.166:53728 -> port 23238, len 44
2020-06-04 00:42:35
49.232.100.177 attackspam
Jun  1 22:13:22 our-server-hostname sshd[23470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.100.177  user=r.r
Jun  1 22:13:24 our-server-hostname sshd[23470]: Failed password for r.r from 49.232.100.177 port 49302 ssh2
Jun  1 22:26:14 our-server-hostname sshd[26331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.100.177  user=r.r
Jun  1 22:26:16 our-server-hostname sshd[26331]: Failed password for r.r from 49.232.100.177 port 55280 ssh2
Jun  1 22:31:49 our-server-hostname sshd[27459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.100.177  user=r.r
Jun  1 22:31:51 our-server-hostname sshd[27459]: Failed password for r.r from 49.232.100.177 port 52156 ssh2
Jun  1 22:37:13 our-server-hostname sshd[28782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.100.177  user=r.r
Jun  1 22........
-------------------------------
2020-06-04 00:55:05
122.51.171.165 attack
SSH invalid-user multiple login attempts
2020-06-04 01:15:28

Recently Reported IPs

190.213.244.89 177.253.100.167 142.93.158.17 223.88.218.244
75.132.252.112 89.151.55.245 27.254.46.198 84.27.23.147
175.64.110.158 178.202.39.166 189.170.19.28 174.178.4.250
139.59.94.54 66.209.176.74 133.16.110.64 206.189.80.125
102.139.187.5 5.166.153.247 195.194.203.2 76.169.123.67