Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.66.148.70 attackbotsspam
Honeypot attack, port: 445, PTR: mail.sanwagroup.com.sg.
2020-04-15 23:20:57
124.66.148.70 attackbotsspam
Honeypot attack, port: 445, PTR: mail.sanwagroup.com.sg.
2020-03-05 03:33:20
124.66.144.114 attackspambots
$f2bV_matches
2019-11-07 17:10:47
124.66.144.114 attackbotsspam
[ssh] SSH attack
2019-11-04 23:32:00
124.66.144.114 attackspambots
Oct 28 17:12:19 xeon sshd[58761]: Failed password for root from 124.66.144.114 port 56004 ssh2
2019-10-29 02:09:24
124.66.144.114 attack
Invalid user admin from 124.66.144.114 port 47638
2019-10-20 03:49:53
124.66.144.114 attack
2019-10-16T12:24:47.589676hub.schaetter.us sshd\[20309\]: Invalid user 1234565 from 124.66.144.114 port 39194
2019-10-16T12:24:47.597836hub.schaetter.us sshd\[20309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.66.144.114
2019-10-16T12:24:49.417509hub.schaetter.us sshd\[20309\]: Failed password for invalid user 1234565 from 124.66.144.114 port 39194 ssh2
2019-10-16T12:29:43.894517hub.schaetter.us sshd\[20371\]: Invalid user letmein123 from 124.66.144.114 port 50314
2019-10-16T12:29:43.903036hub.schaetter.us sshd\[20371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.66.144.114
...
2019-10-16 21:23:28
124.66.144.114 attackbotsspam
Oct 15 13:23:23 ns341937 sshd[13662]: Failed password for root from 124.66.144.114 port 46282 ssh2
Oct 15 13:40:29 ns341937 sshd[18917]: Failed password for root from 124.66.144.114 port 37360 ssh2
...
2019-10-15 21:32:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.66.14.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.66.14.107.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042801 1800 900 604800 86400

;; Query time: 124 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 10:09:00 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 107.14.66.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.14.66.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.139.13.105 attackspambots
2019-10-28T20:43:18.834619abusebot-3.cloudsearch.cf sshd\[25625\]: Invalid user zimbra from 37.139.13.105 port 47100
2019-10-29 06:12:13
179.208.133.103 attack
Invalid user zimbra from 179.208.133.103 port 59781
2019-10-29 05:59:13
88.149.181.240 attack
Invalid user ethos from 88.149.181.240 port 38728
2019-10-29 06:07:49
162.247.74.217 attackspam
Invalid user 2rp from 162.247.74.217 port 55566
2019-10-29 06:01:12
14.63.212.215 attack
Invalid user test from 14.63.212.215 port 45554
2019-10-29 06:14:16
103.92.25.199 attackbots
Invalid user megatbr from 103.92.25.199 port 47850
2019-10-29 06:06:52
104.244.72.98 attackspambots
Invalid user fake from 104.244.72.98 port 48250
2019-10-29 06:28:47
159.89.131.61 attackspam
Invalid user ubnt from 159.89.131.61 port 51030
2019-10-29 06:21:28
146.185.183.65 attackbotsspam
Invalid user catalina from 146.185.183.65 port 56392
2019-10-29 06:02:47
59.25.197.162 attackbotsspam
Oct 28 22:56:12 andromeda sshd\[41388\]: Invalid user nagios from 59.25.197.162 port 36314
Oct 28 22:56:12 andromeda sshd\[41388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.162
Oct 28 22:56:14 andromeda sshd\[41388\]: Failed password for invalid user nagios from 59.25.197.162 port 36314 ssh2
2019-10-29 06:10:56
36.41.174.139 attackspambots
Invalid user grace from 36.41.174.139 port 33216
2019-10-29 06:12:59
139.99.78.208 attack
Invalid user trainee from 139.99.78.208 port 58042
2019-10-29 06:24:26
218.211.169.103 attackspam
Oct 28 22:58:31 MK-Soft-VM3 sshd[11316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.211.169.103 
Oct 28 22:58:33 MK-Soft-VM3 sshd[11316]: Failed password for invalid user www from 218.211.169.103 port 42240 ssh2
...
2019-10-29 06:15:26
192.99.36.76 attack
Invalid user qf from 192.99.36.76 port 46936
2019-10-29 06:16:45
104.210.60.66 attack
Invalid user system from 104.210.60.66 port 52480
2019-10-29 06:29:19

Recently Reported IPs

2.129.216.102 76.169.192.183 109.74.53.10 115.72.77.134
213.157.249.130 113.53.64.11 213.157.243.57 41.26.192.96
156.29.44.98 70.235.92.87 201.51.47.199 208.28.122.92
133.155.153.88 178.3.1.222 193.147.9.226 5.174.233.253
78.138.168.61 189.236.109.133 124.9.182.156 218.79.105.142