Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.243.89.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.243.89.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:07:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 137.89.243.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.89.243.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.83.33.95 attackbots
Unauthorized connection attempt from IP address 183.83.33.95 on Port 445(SMB)
2020-03-18 10:16:47
51.255.168.152 attackbots
Mar 18 01:47:46 cp sshd[24870]: Failed password for root from 51.255.168.152 port 54104 ssh2
Mar 18 01:47:46 cp sshd[24870]: Failed password for root from 51.255.168.152 port 54104 ssh2
2020-03-18 10:17:35
180.247.86.86 attack
Unauthorized connection attempt from IP address 180.247.86.86 on Port 445(SMB)
2020-03-18 10:11:42
106.13.182.60 attackspam
no
2020-03-18 10:33:55
14.166.162.172 attack
Unauthorized connection attempt from IP address 14.166.162.172 on Port 445(SMB)
2020-03-18 10:03:14
121.21.227.47 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:02:05
36.234.68.209 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:22:14
123.12.68.165 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 10:05:15
122.180.137.6 attackbotsspam
Unauthorized connection attempt from IP address 122.180.137.6 on Port 445(SMB)
2020-03-18 10:23:30
211.219.114.39 attackspambots
SSH bruteforce (Triggered fail2ban)
2020-03-18 09:58:29
193.109.79.246 attackspambots
Mar 18 04:34:11 www sshd\[46039\]: Invalid user gameserver from 193.109.79.246
Mar 18 04:34:11 www sshd\[46039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.109.79.246
Mar 18 04:34:13 www sshd\[46039\]: Failed password for invalid user gameserver from 193.109.79.246 port 44058 ssh2
...
2020-03-18 10:38:17
45.133.99.12 attack
Mar 18 03:22:06 mail postfix/smtpd[49798]: warning: unknown[45.133.99.12]: SASL LOGIN authentication failed: authentication failure
Mar 18 03:22:10 mail postfix/smtpd[49798]: warning: unknown[45.133.99.12]: SASL LOGIN authentication failed: authentication failure
Mar 18 03:52:27 mail postfix/smtpd[50582]: warning: unknown[45.133.99.12]: SASL LOGIN authentication failed: authentication failure
...
2020-03-18 10:07:20
185.244.39.196 attack
SSH brutforce
2020-03-18 10:11:21
157.230.30.229 attackbots
Mar 17 22:34:01 firewall sshd[32412]: Failed password for invalid user arthur from 157.230.30.229 port 39540 ssh2
Mar 17 22:37:39 firewall sshd[32628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.30.229  user=root
Mar 17 22:37:40 firewall sshd[32628]: Failed password for root from 157.230.30.229 port 50392 ssh2
...
2020-03-18 10:04:14
196.219.60.68 attackspambots
Unauthorized connection attempt from IP address 196.219.60.68 on Port 445(SMB)
2020-03-18 10:03:56

Recently Reported IPs

150.152.120.36 153.97.122.54 157.72.151.178 52.84.128.45
91.112.126.187 115.169.100.213 248.112.244.7 70.145.128.43
169.76.27.248 212.248.251.181 206.42.218.207 36.75.183.127
227.207.104.198 38.195.50.63 88.187.149.68 71.246.221.146
175.241.161.117 168.187.251.169 253.196.22.255 140.77.136.123