Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.22.93.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.22.93.145.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023101801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 19 04:52:30 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 145.93.22.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.93.22.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.187.39.87 attackspambots
Jul  4 08:42:43 www sshd[11033]: Address 14.187.39.87 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul  4 08:42:43 www sshd[11033]: Invalid user admin from 14.187.39.87
Jul  4 08:42:43 www sshd[11033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.187.39.87 
Jul  4 08:42:45 www sshd[11033]: Failed password for invalid user admin from 14.187.39.87 port 55092 ssh2
Jul  4 08:42:45 www sshd[11033]: Received disconnect from 14.187.39.87: 3: com.jcraft.jsch.JSchException: Auth fail [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.187.39.87
2020-07-06 00:32:08
66.249.66.86 attackspam
Automatic report - Banned IP Access
2020-07-06 00:31:19
117.6.7.111 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-06 00:16:47
180.109.197.144 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-07-06 00:42:33
219.88.72.228 attackbots
Honeypot attack, port: 5555, PTR: 219-88-72-228.adsl.xtra.co.nz.
2020-07-06 00:45:35
5.74.46.4 attackbots
07/05/2020-08:23:24.489777 5.74.46.4 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-07-06 01:04:47
112.29.149.187 attack
Jul  5 17:20:36 server sshd[11098]: Failed password for invalid user maundy from 112.29.149.187 port 34802 ssh2
Jul  5 17:54:04 server sshd[14737]: Failed password for invalid user build from 112.29.149.187 port 36440 ssh2
Jul  5 17:58:19 server sshd[19449]: Failed password for invalid user firebird from 112.29.149.187 port 48274 ssh2
2020-07-06 00:19:11
180.76.181.47 attack
Jul  5 17:55:19 ncomp sshd[612]: Invalid user minecraft from 180.76.181.47
Jul  5 17:55:19 ncomp sshd[612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.181.47
Jul  5 17:55:19 ncomp sshd[612]: Invalid user minecraft from 180.76.181.47
Jul  5 17:55:21 ncomp sshd[612]: Failed password for invalid user minecraft from 180.76.181.47 port 58452 ssh2
2020-07-06 00:18:13
106.104.161.157 attack
Honeypot attack, port: 81, PTR: 106-104-161-157.adsl.static.seed.net.tw.
2020-07-06 00:55:41
61.177.172.128 attack
Brute-force attempt banned
2020-07-06 00:59:26
218.92.0.175 attackbotsspam
Jul  5 21:40:10 gw1 sshd[7194]: Failed password for root from 218.92.0.175 port 27641 ssh2
Jul  5 21:40:22 gw1 sshd[7194]: Failed password for root from 218.92.0.175 port 27641 ssh2
...
2020-07-06 01:00:31
103.31.47.58 attackbotsspam
Jul  5 17:29:42 DAAP sshd[16025]: Invalid user server from 103.31.47.58 port 40772
Jul  5 17:29:42 DAAP sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.47.58
Jul  5 17:29:42 DAAP sshd[16025]: Invalid user server from 103.31.47.58 port 40772
Jul  5 17:29:44 DAAP sshd[16025]: Failed password for invalid user server from 103.31.47.58 port 40772 ssh2
Jul  5 17:36:47 DAAP sshd[16168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.47.58  user=root
Jul  5 17:36:49 DAAP sshd[16168]: Failed password for root from 103.31.47.58 port 35114 ssh2
...
2020-07-06 00:24:43
222.186.175.163 attackspambots
prod11
...
2020-07-06 00:56:27
51.83.73.109 attackspam
2020-07-05T15:05:39.603545server.espacesoutien.com sshd[6882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.109
2020-07-05T15:05:39.592925server.espacesoutien.com sshd[6882]: Invalid user dsadm from 51.83.73.109 port 59636
2020-07-05T15:05:41.070980server.espacesoutien.com sshd[6882]: Failed password for invalid user dsadm from 51.83.73.109 port 59636 ssh2
2020-07-05T15:08:59.285941server.espacesoutien.com sshd[7102]: Invalid user zq from 51.83.73.109 port 58510
...
2020-07-06 00:19:29
202.29.94.204 attackbotsspam
20/7/5@08:23:53: FAIL: Alarm-Network address from=202.29.94.204
...
2020-07-06 00:27:41

Recently Reported IPs

36.50.232.234 132.178.190.90 24.134.62.68 177.189.202.1
47.215.123.199 18.250.13.178 96.7.197.141 5.122.58.102
238.253.27.232 76.149.6.154 110.108.27.119 242.95.142.192
73.2.140.15 254.254.35.62 252.24.13.62 166.65.8.154
11.121.96.38 19.152.81.7 157.142.61.72 208.116.200.195