Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.89.119.4 botsattackproxy
Vulnerability Scanner
2025-03-25 21:45:04
124.89.119.9 attackbotsspam
Detected by ModSecurity. Host header is an IP address, Request URI: /HNAP1/
2020-08-07 20:01:32
124.89.119.8 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 5436457cbdb79875 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/4.038533357 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1) QQBrowser/6.0 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 05:09:50
124.89.119.11 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5414b31affa2e4d9 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.067805899 Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:49:58
124.89.119.11 bots
124.89.119.11 - - [23/Apr/2019:13:55:45 +0800] "GET /view/img/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36"
112.80.137.106 - - [23/Apr/2019:13:55:45 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
121.57.228.33 - - [23/Apr/2019:13:55:46 +0800] "GET /view/img/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
121.57.228.33 - - [23/Apr/2019:13:55:46 +0800] "GET /view/img/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0"
2019-04-23 13:58:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.89.119.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.89.119.5.			IN	A

;; AUTHORITY SECTION:
.			433	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:31:56 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 5.119.89.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.119.89.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.162.217.150 attackbotsspam
Unauthorized connection attempt from IP address 125.162.217.150 on Port 445(SMB)
2020-09-02 07:09:16
85.209.0.102 attackbotsspam
Sep  2 01:02:38 marvibiene sshd[19773]: Failed password for root from 85.209.0.102 port 12546 ssh2
2020-09-02 07:04:10
51.77.210.201 attack
Sep  2 00:30:24 pve1 sshd[29213]: Failed password for root from 51.77.210.201 port 45188 ssh2
Sep  2 00:30:27 pve1 sshd[29213]: Failed password for root from 51.77.210.201 port 45188 ssh2
...
2020-09-02 06:48:08
163.172.143.1 attackspambots
$f2bV_matches
2020-09-02 06:54:32
41.35.254.211 attack
Unauthorized connection attempt from IP address 41.35.254.211 on Port 445(SMB)
2020-09-02 07:16:43
189.204.140.49 attackspam
Unauthorized connection attempt from IP address 189.204.140.49 on Port 445(SMB)
2020-09-02 06:55:53
222.186.180.6 attack
Sep  2 01:11:12 jane sshd[15431]: Failed password for root from 222.186.180.6 port 18370 ssh2
Sep  2 01:11:16 jane sshd[15431]: Failed password for root from 222.186.180.6 port 18370 ssh2
...
2020-09-02 07:12:06
190.13.173.67 attackbotsspam
SSH Invalid Login
2020-09-02 07:21:29
176.59.64.27 attackspambots
Unauthorized connection attempt from IP address 176.59.64.27 on Port 445(SMB)
2020-09-02 07:06:42
49.235.217.169 attack
Invalid user test from 49.235.217.169 port 48980
2020-09-02 06:49:31
185.232.30.130 attackspam
trying to access non-authorized port
2020-09-02 07:01:39
113.57.170.50 attack
(sshd) Failed SSH login from 113.57.170.50 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  1 18:13:58 server2 sshd[15793]: Invalid user ljq from 113.57.170.50
Sep  1 18:13:58 server2 sshd[15793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.170.50 
Sep  1 18:14:00 server2 sshd[15793]: Failed password for invalid user ljq from 113.57.170.50 port 14465 ssh2
Sep  1 18:17:30 server2 sshd[19981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.170.50  user=root
Sep  1 18:17:32 server2 sshd[19981]: Failed password for root from 113.57.170.50 port 21707 ssh2
2020-09-02 07:16:24
190.153.54.125 attackspambots
Unauthorized connection attempt from IP address 190.153.54.125 on Port 445(SMB)
2020-09-02 07:18:50
115.225.27.66 attackbotsspam
1598978826 - 09/01/2020 18:47:06 Host: 115.225.27.66/115.225.27.66 Port: 445 TCP Blocked
2020-09-02 06:43:52
185.247.20.155 attack
1598978801 - 09/01/2020 18:46:41 Host: 185.247.20.155/185.247.20.155 Port: 445 TCP Blocked
2020-09-02 07:05:02

Recently Reported IPs

45.57.254.183 52.188.159.80 119.42.76.64 95.234.24.100
61.53.126.67 27.123.249.229 159.192.37.150 41.114.6.179
138.68.134.139 177.53.164.125 186.226.242.70 176.236.14.2
27.202.232.75 170.187.155.104 36.92.240.42 117.102.78.165
91.222.140.242 59.125.101.97 13.59.34.132 223.17.67.131