Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: Beijing Teletron Telecom Engineering Co. Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 124.205.131.139 to port 1433 [T]
2020-08-14 01:40:39
attackbots
Unauthorized connection attempt detected from IP address 124.205.131.139 to port 1433 [T]
2020-05-09 04:40:14
attackbots
unauthorized connection attempt
2020-02-16 20:24:05
attack
Port 1433 Scan
2020-01-01 21:53:58
attackbotsspam
Unauthorized connection attempt detected from IP address 124.205.131.139 to port 1433
2019-12-27 19:33:14
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-21 23:25:07
attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 08:19:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.205.131.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.205.131.139.		IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102701 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 28 08:19:27 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 139.131.205.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.131.205.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.79.169 attackspambots
Invalid user tool from 111.229.79.169 port 47328
2020-07-18 22:04:00
182.254.162.72 attackspambots
Jul 18 14:50:11 *hidden* sshd[34315]: Invalid user dasusr1 from 182.254.162.72 port 60916 Jul 18 14:50:11 *hidden* sshd[34315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.162.72 Jul 18 14:50:11 *hidden* sshd[34315]: Invalid user dasusr1 from 182.254.162.72 port 60916 Jul 18 14:50:11 *hidden* sshd[34315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.162.72 Jul 18 14:50:11 *hidden* sshd[34315]: Invalid user dasusr1 from 182.254.162.72 port 60916 Jul 18 14:50:11 *hidden* sshd[34315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.162.72 Jul 18 14:50:13 *hidden* sshd[34315]: Failed password for invalid user dasusr1 from 182.254.162.72 port 60916 ssh2
2020-07-18 21:51:27
167.99.77.94 attackbotsspam
Invalid user nexus from 167.99.77.94 port 37498
2020-07-18 21:53:35
72.42.170.60 attack
Invalid user nicolas from 72.42.170.60 port 36890
2020-07-18 22:10:24
219.159.83.164 attackspam
Invalid user smbread from 219.159.83.164 port 38315
2020-07-18 21:41:39
106.13.164.67 attack
Unauthorized connection attempt detected from IP address 106.13.164.67 to port 8795
2020-07-18 22:05:04
79.224.161.171 attackbots
Invalid user admin from 79.224.161.171 port 39785
2020-07-18 22:08:38
47.187.78.70 attackbots
Invalid user admin from 47.187.78.70 port 38284
2020-07-18 21:37:44
185.220.103.5 attackbots
2020-07-18 08:35:29.217040-0500  localhost sshd[15432]: Failed password for root from 185.220.103.5 port 52352 ssh2
2020-07-18 21:50:21
62.39.71.34 attack
Invalid user user from 62.39.71.34 port 53323
2020-07-18 21:32:42
212.64.71.225 attackspam
Jul 18 15:33:53 ArkNodeAT sshd\[30425\]: Invalid user server from 212.64.71.225
Jul 18 15:33:53 ArkNodeAT sshd\[30425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.71.225
Jul 18 15:33:55 ArkNodeAT sshd\[30425\]: Failed password for invalid user server from 212.64.71.225 port 34072 ssh2
2020-07-18 21:43:43
54.38.240.23 attack
2020-07-18T15:08:58.949182vps773228.ovh.net sshd[9030]: Invalid user raghav from 54.38.240.23 port 52788
2020-07-18T15:08:58.985544vps773228.ovh.net sshd[9030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.ip-54-38-240.eu
2020-07-18T15:08:58.949182vps773228.ovh.net sshd[9030]: Invalid user raghav from 54.38.240.23 port 52788
2020-07-18T15:09:00.820079vps773228.ovh.net sshd[9030]: Failed password for invalid user raghav from 54.38.240.23 port 52788 ssh2
2020-07-18T15:13:15.761569vps773228.ovh.net sshd[9074]: Invalid user seafile from 54.38.240.23 port 39620
...
2020-07-18 21:34:47
159.65.162.189 attackspambots
(sshd) Failed SSH login from 159.65.162.189 (US/United States/-): 5 in the last 3600 secs
2020-07-18 21:54:36
185.24.154.86 attack
Invalid user yx from 185.24.154.86 port 58674
2020-07-18 21:51:02
180.76.96.55 attackbotsspam
2020-07-18T14:08:26.1573781240 sshd\[24015\]: Invalid user judy from 180.76.96.55 port 35980
2020-07-18T14:08:26.1611551240 sshd\[24015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.96.55
2020-07-18T14:08:28.3702011240 sshd\[24015\]: Failed password for invalid user judy from 180.76.96.55 port 35980 ssh2
...
2020-07-18 21:52:19

Recently Reported IPs

201.4.115.231 168.197.29.189 131.244.97.237 117.50.96.239
80.73.89.111 115.238.59.165 122.195.173.151 190.215.93.104
230.30.104.70 68.68.0.207 174.96.199.144 43.241.61.243
61.165.247.87 12.152.234.176 194.158.235.110 42.64.64.89
41.109.79.15 54.211.229.201 159.224.220.209 203.63.46.142