Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Paju-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.61.19.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.61.19.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070401 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 05 10:40:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 138.19.61.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.19.61.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.204.60.185 attackspambots
May 21 05:56:15 icecube postfix/smtpd[55237]: NOQUEUE: reject: RCPT from unknown[119.204.60.185]: 553 5.7.1 : Sender address rejected: not logged in; from= to= proto=ESMTP helo=<[127.0.0.1]>
2020-05-21 14:31:21
129.204.186.151 attackbots
5x Failed Password
2020-05-21 14:51:26
137.74.166.77 attackspambots
Invalid user dbl from 137.74.166.77 port 53766
2020-05-21 14:43:44
45.71.100.67 attackspambots
2020-05-21T06:00:59.823087shield sshd\[11308\]: Invalid user twk from 45.71.100.67 port 46867
2020-05-21T06:00:59.826706shield sshd\[11308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.100.67
2020-05-21T06:01:02.214860shield sshd\[11308\]: Failed password for invalid user twk from 45.71.100.67 port 46867 ssh2
2020-05-21T06:05:27.750304shield sshd\[12534\]: Invalid user qwx from 45.71.100.67 port 44641
2020-05-21T06:05:27.754052shield sshd\[12534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.100.67
2020-05-21 14:11:47
61.164.213.198 attack
2020-05-21T05:35:38.335393ionos.janbro.de sshd[89940]: Invalid user umi from 61.164.213.198 port 59493
2020-05-21T05:35:40.382994ionos.janbro.de sshd[89940]: Failed password for invalid user umi from 61.164.213.198 port 59493 ssh2
2020-05-21T05:45:51.565178ionos.janbro.de sshd[89988]: Invalid user qki from 61.164.213.198 port 34487
2020-05-21T05:45:51.647444ionos.janbro.de sshd[89988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.213.198
2020-05-21T05:45:51.565178ionos.janbro.de sshd[89988]: Invalid user qki from 61.164.213.198 port 34487
2020-05-21T05:45:53.385777ionos.janbro.de sshd[89988]: Failed password for invalid user qki from 61.164.213.198 port 34487 ssh2
2020-05-21T05:50:55.942062ionos.janbro.de sshd[89993]: Invalid user wmy from 61.164.213.198 port 36100
2020-05-21T05:50:55.985608ionos.janbro.de sshd[89993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.213.198
2020-05-21T05:50
...
2020-05-21 14:11:23
220.117.115.10 attackbotsspam
May 21 11:04:13 gw1 sshd[969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.115.10
May 21 11:04:15 gw1 sshd[969]: Failed password for invalid user xzr from 220.117.115.10 port 35462 ssh2
...
2020-05-21 14:38:51
222.186.42.7 attackspambots
May 21 06:38:14 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
May 21 06:38:14 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
May 21 06:38:18 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
...
2020-05-21 14:42:05
77.68.92.242 attackspam
[ThuMay2105:56:13.3893662020][:error][pid6506:tid47395584898816][client77.68.92.242:53850][client77.68.92.242]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"402"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"lighthouse-accessoires.ch"][uri"/-/grafana/login/"][unique_id"XsX73cIqRCV8D1j-Q1k2lgAAAJU"][ThuMay2105:56:13.4821712020][:error][pid6591:tid47395576493824][client77.68.92.242:53934][client77.68.92.242]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"402"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.
2020-05-21 14:31:49
206.189.3.250 attackspam
May 21 06:20:24 game-panel sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.3.250
May 21 06:20:26 game-panel sshd[5763]: Failed password for invalid user mediafire from 206.189.3.250 port 49710 ssh2
May 21 06:24:35 game-panel sshd[9503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.3.250
2020-05-21 14:49:14
171.231.64.54 attackspam
May 21 06:21:43 mail sshd[13405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.231.64.54 
May 21 06:21:45 mail sshd[13405]: Failed password for invalid user ubnt from 171.231.64.54 port 38389 ssh2
...
2020-05-21 14:40:33
106.13.1.245 attackbots
$f2bV_matches
2020-05-21 14:28:54
106.12.137.1 attackspam
May 20 20:20:09 web1 sshd\[2468\]: Invalid user wgo from 106.12.137.1
May 20 20:20:09 web1 sshd\[2468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1
May 20 20:20:11 web1 sshd\[2468\]: Failed password for invalid user wgo from 106.12.137.1 port 35692 ssh2
May 20 20:24:43 web1 sshd\[2844\]: Invalid user oba from 106.12.137.1
May 20 20:24:43 web1 sshd\[2844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.1
2020-05-21 14:27:21
164.68.107.6 attack
$f2bV_matches
2020-05-21 14:49:41
106.12.33.174 attackspam
May 21 06:19:30 srv01 sshd[7557]: Invalid user jbz from 106.12.33.174 port 52590
May 21 06:19:30 srv01 sshd[7557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.174
May 21 06:19:30 srv01 sshd[7557]: Invalid user jbz from 106.12.33.174 port 52590
May 21 06:19:32 srv01 sshd[7557]: Failed password for invalid user jbz from 106.12.33.174 port 52590 ssh2
May 21 06:22:04 srv01 sshd[7781]: Invalid user dm from 106.12.33.174 port 54884
...
2020-05-21 14:48:50
166.111.152.230 attack
Invalid user okp from 166.111.152.230 port 38134
2020-05-21 14:44:15

Recently Reported IPs

169.23.187.98 86.54.28.101 113.215.188.210 63.212.70.63
58.18.112.46 43.153.204.189 35.203.210.25 18.207.93.126
175.107.3.121 135.237.125.158 13.160.70.111 93.231.164.44
97.84.99.89 20.220.28.148 41.96.242.15 61.223.66.201
199.186.188.10 112.135.228.135 112.135.228.220 198.235.24.203