Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: ChinaNet Shanghai Province Network

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Scanning random ports - tries to find possible vulnerable services
2019-09-01 16:56:25
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.74.150.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62772
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.74.150.114.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 16:56:17 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 114.150.74.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 114.150.74.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.117.197.207 attackspam
Unauthorized connection attempt from IP address 103.117.197.207 on Port 445(SMB)
2019-12-28 06:08:50
209.141.58.147 attack
Unauthorized connection attempt detected from IP address 209.141.58.147 to port 5432
2019-12-28 06:15:17
49.235.18.9 attack
Dec 27 22:24:04 MK-Soft-VM5 sshd[12225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.18.9 
Dec 27 22:24:07 MK-Soft-VM5 sshd[12225]: Failed password for invalid user conf from 49.235.18.9 port 52544 ssh2
...
2019-12-28 05:53:26
95.110.235.17 attack
Invalid user admin from 95.110.235.17 port 45708
2019-12-28 05:41:07
103.76.140.93 attackbots
Unauthorized connection attempt from IP address 103.76.140.93 on Port 445(SMB)
2019-12-28 05:47:20
222.186.175.217 attack
Dec 27 23:02:05 meumeu sshd[20459]: Failed password for root from 222.186.175.217 port 31162 ssh2
Dec 27 23:02:21 meumeu sshd[20459]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 31162 ssh2 [preauth]
Dec 27 23:02:27 meumeu sshd[20495]: Failed password for root from 222.186.175.217 port 26512 ssh2
...
2019-12-28 06:07:29
46.105.244.1 attackspam
--- report ---
Dec 27 12:06:02 sshd: Connection from 46.105.244.1 port 58612
2019-12-28 05:58:00
117.5.222.231 attackbotsspam
" "
2019-12-28 05:50:56
189.162.150.239 attack
Unauthorized connection attempt from IP address 189.162.150.239 on Port 445(SMB)
2019-12-28 06:00:56
61.2.144.141 attack
Unauthorized connection attempt from IP address 61.2.144.141 on Port 445(SMB)
2019-12-28 06:01:54
149.202.55.18 attackbotsspam
Automatic report - Banned IP Access
2019-12-28 05:40:50
181.143.216.226 attackspam
Unauthorized connection attempt from IP address 181.143.216.226 on Port 445(SMB)
2019-12-28 06:06:58
104.140.188.38 attackbots
" "
2019-12-28 06:01:35
198.12.156.214 attack
WordPress wp-login brute force :: 198.12.156.214 0.168 - [27/Dec/2019:18:09:14  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-12-28 06:04:21
180.242.181.183 attackbots
1577472657 - 12/27/2019 19:50:57 Host: 180.242.181.183/180.242.181.183 Port: 445 TCP Blocked
2019-12-28 05:40:38

Recently Reported IPs

123.27.253.233 123.25.197.227 123.18.206.15 122.176.83.72
122.176.57.247 122.118.25.169 118.164.216.11 121.164.252.197
121.149.48.74 121.78.145.241 13.7.217.106 120.146.39.194
119.62.73.24 160.132.142.218 119.42.119.49 210.72.106.174
73.38.142.152 118.172.151.126 173.242.119.199 63.5.127.12