Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.67.66.50 attackspam
2020-08-25T14:03:08.529126hostname sshd[13268]: Invalid user xyz from 124.67.66.50 port 36623
...
2020-08-25 16:33:38
124.67.66.50 attackbotsspam
Aug 23 00:32:18 server sshd[14330]: Failed password for invalid user telecom from 124.67.66.50 port 56857 ssh2
Aug 23 00:35:48 server sshd[15848]: Failed password for invalid user deployer from 124.67.66.50 port 53979 ssh2
Aug 23 00:39:21 server sshd[17477]: Failed password for invalid user git from 124.67.66.50 port 51108 ssh2
2020-08-23 07:05:47
124.67.66.50 attackspam
Aug 19 22:44:37 ns382633 sshd\[29293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50  user=root
Aug 19 22:44:39 ns382633 sshd\[29293\]: Failed password for root from 124.67.66.50 port 54641 ssh2
Aug 19 22:57:38 ns382633 sshd\[31764\]: Invalid user doku from 124.67.66.50 port 46179
Aug 19 22:57:38 ns382633 sshd\[31764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50
Aug 19 22:57:40 ns382633 sshd\[31764\]: Failed password for invalid user doku from 124.67.66.50 port 46179 ssh2
2020-08-20 06:32:43
124.67.66.50 attackbotsspam
2020-08-09 01:51:12.473313-0500  localhost sshd[50924]: Failed password for root from 124.67.66.50 port 39672 ssh2
2020-08-09 17:24:39
124.67.66.50 attack
2020-08-07T19:03:45.847682hostname sshd[12273]: Failed password for root from 124.67.66.50 port 57832 ssh2
2020-08-07T19:06:47.320274hostname sshd[13214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50  user=root
2020-08-07T19:06:48.912833hostname sshd[13214]: Failed password for root from 124.67.66.50 port 49655 ssh2
...
2020-08-07 22:16:28
124.67.66.50 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-24 13:26:50
124.67.66.50 attackspam
Invalid user hu from 124.67.66.50 port 37612
2020-07-12 14:08:23
124.67.66.50 attackspam
Jul 11 22:08:35 buvik sshd[7015]: Invalid user hari from 124.67.66.50
Jul 11 22:08:35 buvik sshd[7015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50
Jul 11 22:08:36 buvik sshd[7015]: Failed password for invalid user hari from 124.67.66.50 port 41934 ssh2
...
2020-07-12 04:15:30
124.67.66.50 attack
Jul  8 13:48:10 mail sshd[41440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50 
Jul  8 13:48:12 mail sshd[41440]: Failed password for invalid user zhoujingyu from 124.67.66.50 port 58571 ssh2
...
2020-07-08 20:59:56
124.67.66.50 attackbots
2020-07-08T03:13:21.190547hostname sshd[23358]: Invalid user cyrus from 124.67.66.50 port 41843
...
2020-07-08 06:02:44
124.67.66.50 attack
Jun 26 08:00:55 [host] sshd[14359]: Invalid user n
Jun 26 08:00:55 [host] sshd[14359]: pam_unix(sshd:
Jun 26 08:00:57 [host] sshd[14359]: Failed passwor
2020-06-26 14:46:24
124.67.66.50 attack
Jun 15 23:04:40 jane sshd[15682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50 
Jun 15 23:04:43 jane sshd[15682]: Failed password for invalid user mobile from 124.67.66.50 port 53720 ssh2
...
2020-06-16 05:40:16
124.67.66.50 attack
Jun 14 19:47:02 vps46666688 sshd[1571]: Failed password for root from 124.67.66.50 port 36589 ssh2
Jun 14 19:49:06 vps46666688 sshd[1578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.67.66.50
...
2020-06-15 07:27:03
124.67.66.51 attackspam
Port probing on unauthorized port 1433
2020-04-28 13:40:01
124.67.66.51 attackbots
Jan  8 05:56:30 debian-2gb-nbg1-2 kernel: \[718706.188170\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=124.67.66.51 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=49895 PROTO=TCP SPT=53316 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-08 13:29:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.67.66.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.67.66.74.			IN	A

;; AUTHORITY SECTION:
.			27	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 13:18:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 74.66.67.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 74.66.67.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
2.147.205.249 attackspambots
Unauthorized connection attempt detected from IP address 2.147.205.249 to port 445
2020-05-12 23:14:41
222.186.30.167 attack
Automatic report BANNED IP
2020-05-12 22:36:41
78.187.24.172 attackspam
Unauthorized connection attempt detected from IP address 78.187.24.172 to port 23
2020-05-12 22:27:33
162.212.114.205 attackbotsspam
Unauthorized connection attempt detected from IP address 162.212.114.205 to port 8080
2020-05-12 22:49:14
187.112.170.143 attack
Unauthorized connection attempt detected from IP address 187.112.170.143 to port 23
2020-05-12 23:19:11
111.43.220.34 attack
Unauthorized connection attempt detected from IP address 111.43.220.34 to port 23
2020-05-12 22:54:49
185.243.51.26 attackspambots
Unauthorized connection attempt detected from IP address 185.243.51.26 to port 80
2020-05-12 22:47:09
14.245.117.161 attackspambots
Unauthorized connection attempt detected from IP address 14.245.117.161 to port 445
2020-05-12 23:12:34
2.237.76.23 attackbotsspam
Unauthorized connection attempt detected from IP address 2.237.76.23 to port 82
2020-05-12 22:35:43
70.113.205.233 attackspam
Unauthorized connection attempt detected from IP address 70.113.205.233 to port 80
2020-05-12 22:31:14
213.77.26.2 attack
Unauthorized connection attempt detected from IP address 213.77.26.2 to port 23
2020-05-12 23:15:19
66.42.21.51 attackspambots
Unauthorized connection attempt detected from IP address 66.42.21.51 to port 23
2020-05-12 23:06:59
41.42.224.180 attackbots
Unauthorized connection attempt detected from IP address 41.42.224.180 to port 8080
2020-05-12 23:09:55
75.31.193.147 attack
Unauthorized connection attempt detected from IP address 75.31.193.147 to port 23
2020-05-12 22:30:19
37.6.20.3 attackbotsspam
Unauthorized connection attempt detected from IP address 37.6.20.3 to port 88
2020-05-12 23:11:42

Recently Reported IPs

1.226.144.227 51.75.161.78 192.236.236.213 36.74.45.127
113.218.239.150 110.231.216.91 115.58.92.56 38.7.84.134
222.135.10.35 217.218.242.75 69.125.82.166 112.94.97.191
45.173.149.219 81.220.247.209 220.116.230.50 197.210.130.10
121.230.153.32 154.38.240.4 203.223.191.206 77.220.194.27