Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: KDDI CORPORATION

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.214.152.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12079
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.214.152.192.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 17:37:02 CST 2019
;; MSG SIZE  rcvd: 119

Host info
192.152.214.124.in-addr.arpa domain name pointer KD124214152192.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
192.152.214.124.in-addr.arpa	name = KD124214152192.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
94.102.56.181 attackbotsspam
Mar 26 09:55:44 debian-2gb-nbg1-2 kernel: \[7472020.669059\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=53159 PROTO=TCP SPT=40705 DPT=33893 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 17:45:18
185.175.93.105 attackspam
Port-scan: detected 101 distinct ports within a 24-hour window.
2020-03-26 17:33:40
93.174.93.72 attack
firewall-block, port(s): 41998/tcp, 42998/tcp, 48998/tcp, 49998/tcp, 52998/tcp
2020-03-26 18:07:16
85.209.3.152 attackbotsspam
Port 3831 scan denied
2020-03-26 17:48:36
198.108.67.52 attack
03/26/2020-02:43:03.764303 198.108.67.52 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-26 17:24:29
195.49.186.210 attack
Port 5555 scan denied
2020-03-26 17:27:56
221.226.142.2 attackspam
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(03260933)
2020-03-26 17:17:51
45.141.84.17 attack
Mar 26 10:13:54 debian-2gb-nbg1-2 kernel: \[7473110.604720\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.17 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=27861 PROTO=TCP SPT=41537 DPT=8407 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 17:16:31
37.49.230.95 attackspambots
Automatic report - Port Scan Attack
2020-03-26 17:59:16
51.91.212.80 attackspam
903/tcp 5900/tcp 9151/tcp...
[2020-01-25/03-26]1547pkt,115pt.(tcp)
2020-03-26 17:54:52
51.83.66.171 attack
Port 8010 scan denied
2020-03-26 17:14:09
178.62.108.111 attackspambots
Port 16411 scan denied
2020-03-26 17:36:46
51.83.78.82 attackbots
Port 8545 (Ethereum client) access denied
2020-03-26 17:55:12
164.160.92.56 attackbotsspam
Detected By Fail2ban
2020-03-26 18:06:19
148.153.65.30 attack
Unauthorized connection attempt detected from IP address 148.153.65.30 to port 5432
2020-03-26 17:38:10

Recently Reported IPs

106.133.121.166 156.216.230.230 91.193.173.178 168.60.154.197
211.239.163.202 14.138.117.21 203.229.156.211 123.18.206.13
73.0.103.193 91.207.244.211 86.170.178.43 59.153.233.178
114.88.219.169 42.115.196.165 157.113.110.169 183.231.29.1
55.78.218.1 78.26.225.208 208.153.242.198 62.80.169.56