Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.45.141.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.45.141.164.			IN	A

;; AUTHORITY SECTION:
.			380	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030901 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 12:33:42 CST 2022
;; MSG SIZE  rcvd: 107
Host info
164.141.45.124.in-addr.arpa domain name pointer g164.124-45-141.ppp.wakwak.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.141.45.124.in-addr.arpa	name = g164.124-45-141.ppp.wakwak.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.190.57.4 attack
Jan  1 09:11:43 server sshd\[8825\]: Invalid user ahess from 109.190.57.4
Jan  1 09:11:43 server sshd\[8825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr 
Jan  1 09:11:44 server sshd\[8825\]: Failed password for invalid user ahess from 109.190.57.4 port 62799 ssh2
Jan  1 09:24:22 server sshd\[11536\]: Invalid user prosyk from 109.190.57.4
Jan  1 09:24:22 server sshd\[11536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=4-57-190-109.dsl.ovh.fr 
...
2020-01-01 18:00:16
158.69.220.178 attack
invalid user
2020-01-01 18:33:24
106.75.86.217 attack
Automatic report - Banned IP Access
2020-01-01 18:10:42
222.186.175.182 attackspambots
2020-01-01T09:41:41.962502abusebot-4.cloudsearch.cf sshd[19162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-01-01T09:41:43.906059abusebot-4.cloudsearch.cf sshd[19162]: Failed password for root from 222.186.175.182 port 21338 ssh2
2020-01-01T09:41:47.574959abusebot-4.cloudsearch.cf sshd[19162]: Failed password for root from 222.186.175.182 port 21338 ssh2
2020-01-01T09:41:41.962502abusebot-4.cloudsearch.cf sshd[19162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2020-01-01T09:41:43.906059abusebot-4.cloudsearch.cf sshd[19162]: Failed password for root from 222.186.175.182 port 21338 ssh2
2020-01-01T09:41:47.574959abusebot-4.cloudsearch.cf sshd[19162]: Failed password for root from 222.186.175.182 port 21338 ssh2
2020-01-01T09:41:41.962502abusebot-4.cloudsearch.cf sshd[19162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-01-01 17:58:17
93.149.12.2 attackspam
Jan  1 07:46:14 www_kotimaassa_fi sshd[28688]: Failed password for root from 93.149.12.2 port 37544 ssh2
...
2020-01-01 18:31:27
212.156.17.218 attack
$f2bV_matches
2020-01-01 18:23:54
117.71.9.108 attackspam
Scanning
2020-01-01 18:14:50
81.215.227.13 attack
Automatic report - Port Scan Attack
2020-01-01 18:01:05
185.53.168.96 attackbotsspam
$f2bV_matches
2020-01-01 18:02:33
125.161.94.86 attackspam
Unauthorized connection attempt detected from IP address 125.161.94.86 to port 445
2020-01-01 18:08:00
213.6.172.134 attackbots
<6 unauthorized SSH connections
2020-01-01 18:19:07
183.138.46.22 attackbots
Scanning
2020-01-01 18:17:32
189.90.241.134 attack
2020-01-01T08:23:00.088095shield sshd\[22663\]: Invalid user vanbemmelen from 189.90.241.134 port 36018
2020-01-01T08:23:00.093708shield sshd\[22663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.241.134
2020-01-01T08:23:02.258636shield sshd\[22663\]: Failed password for invalid user vanbemmelen from 189.90.241.134 port 36018 ssh2
2020-01-01T08:29:30.187959shield sshd\[25665\]: Invalid user 123@Abc from 189.90.241.134 port 38226
2020-01-01T08:29:30.193491shield sshd\[25665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.241.134
2020-01-01 18:06:36
183.163.119.21 attack
Port Scan
2020-01-01 18:07:08
111.197.65.59 attack
Scanning
2020-01-01 18:27:35

Recently Reported IPs

124.45.120.122 124.45.142.151 124.45.32.165 124.45.72.104
124.45.78.134 124.46.201.102 124.47.104.208 124.47.13.86
124.47.135.97 124.47.140.142 124.47.147.4 124.47.162.123
124.47.169.29 124.47.171.25 124.47.172.161 124.47.172.36
124.47.172.60 124.47.173.35 124.47.185.69 124.47.187.246