Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.90.52.214 attackspambots
Web Server Scan. RayID: 58f1c6a568b293c4, UA: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36, Country: CN
2020-05-21 03:59:29
124.90.52.158 attackbots
Fail2Ban Ban Triggered
2020-04-16 14:48:59
124.90.52.243 attackspam
Unauthorized connection attempt detected from IP address 124.90.52.243 to port 8081 [J]
2020-01-26 05:00:54
124.90.52.189 attack
Unauthorized connection attempt detected from IP address 124.90.52.189 to port 82 [T]
2020-01-10 08:46:03
124.90.52.114 attackspambots
Unauthorized connection attempt detected from IP address 124.90.52.114 to port 3128
2019-12-31 07:33:14
124.90.52.137 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5414e5dd78c695f3 | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:31:03
124.90.52.118 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5416098bfab493ac | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.082584686 Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:09:19
124.90.52.86 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 541380e48a61ed3b | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:54:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.90.52.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.90.52.115.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030801 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 00:37:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 115.52.90.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 115.52.90.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.217.181.18 attack
Aug 25 12:30:04 dignus sshd[19168]: Invalid user shop from 188.217.181.18 port 35982
Aug 25 12:30:04 dignus sshd[19168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.217.181.18
Aug 25 12:30:06 dignus sshd[19168]: Failed password for invalid user shop from 188.217.181.18 port 35982 ssh2
Aug 25 12:33:44 dignus sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.217.181.18  user=root
Aug 25 12:33:46 dignus sshd[19666]: Failed password for root from 188.217.181.18 port 43316 ssh2
...
2020-08-26 03:36:47
66.249.155.245 attack
Aug 25 22:13:38 journals sshd\[78920\]: Invalid user db2fenc1 from 66.249.155.245
Aug 25 22:13:38 journals sshd\[78920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.245
Aug 25 22:13:41 journals sshd\[78920\]: Failed password for invalid user db2fenc1 from 66.249.155.245 port 44260 ssh2
Aug 25 22:18:05 journals sshd\[79401\]: Invalid user uftp from 66.249.155.245
Aug 25 22:18:05 journals sshd\[79401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.245
...
2020-08-26 03:25:18
64.53.14.211 attackspam
2020-08-25T15:11:51.774883sorsha.thespaminator.com sshd[13501]: Invalid user manager from 64.53.14.211 port 53486
2020-08-25T15:11:57.011180sorsha.thespaminator.com sshd[13501]: Failed password for invalid user manager from 64.53.14.211 port 53486 ssh2
...
2020-08-26 03:26:17
159.65.142.192 attack
*Port Scan* detected from 159.65.142.192 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 235 seconds
2020-08-26 03:42:38
111.229.251.35 attackbotsspam
(sshd) Failed SSH login from 111.229.251.35 (CN/China/-): 5 in the last 3600 secs
2020-08-26 03:48:43
64.71.131.100 attackspambots
$f2bV_matches
2020-08-26 03:25:38
111.231.71.53 attack
Aug 25 16:31:08 Ubuntu-1404-trusty-64-minimal sshd\[13567\]: Invalid user hans from 111.231.71.53
Aug 25 16:31:08 Ubuntu-1404-trusty-64-minimal sshd\[13567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.53
Aug 25 16:31:10 Ubuntu-1404-trusty-64-minimal sshd\[13567\]: Failed password for invalid user hans from 111.231.71.53 port 48044 ssh2
Aug 25 16:49:53 Ubuntu-1404-trusty-64-minimal sshd\[24528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.71.53  user=root
Aug 25 16:49:55 Ubuntu-1404-trusty-64-minimal sshd\[24528\]: Failed password for root from 111.231.71.53 port 38854 ssh2
2020-08-26 03:20:03
200.73.128.100 attackbotsspam
Aug 25 20:53:35 buvik sshd[22391]: Invalid user rec from 200.73.128.100
Aug 25 20:53:35 buvik sshd[22391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.100
Aug 25 20:53:36 buvik sshd[22391]: Failed password for invalid user rec from 200.73.128.100 port 44746 ssh2
...
2020-08-26 03:34:05
111.67.194.217 attack
Invalid user kiran from 111.67.194.217 port 37116
2020-08-26 03:20:38
129.226.178.235 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-25T14:51:22Z and 2020-08-25T15:10:36Z
2020-08-26 03:44:50
95.167.139.66 attack
Aug 25 20:38:20 mout sshd[17239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.139.66  user=root
Aug 25 20:38:22 mout sshd[17239]: Failed password for root from 95.167.139.66 port 55155 ssh2
2020-08-26 03:54:37
82.65.33.144 attackspambots
SSH Honeypot -> SSH Bruteforce / Login
2020-08-26 03:24:22
68.183.82.97 attackspambots
Aug 25 20:00:30 ajax sshd[12665]: Failed password for root from 68.183.82.97 port 58230 ssh2
Aug 25 20:04:46 ajax sshd[14159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.82.97
2020-08-26 03:57:31
99.184.69.177 attackspambots
Aug 25 19:21:21 xeon sshd[55720]: Failed password for invalid user liupeng from 99.184.69.177 port 32944 ssh2
2020-08-26 03:23:22
185.74.4.189 attack
2020-08-25 14:35:27,554 fail2ban.actions        [937]: NOTICE  [sshd] Ban 185.74.4.189
2020-08-25 15:10:03,395 fail2ban.actions        [937]: NOTICE  [sshd] Ban 185.74.4.189
2020-08-25 15:45:09,876 fail2ban.actions        [937]: NOTICE  [sshd] Ban 185.74.4.189
2020-08-25 16:20:33,194 fail2ban.actions        [937]: NOTICE  [sshd] Ban 185.74.4.189
2020-08-25 16:56:32,107 fail2ban.actions        [937]: NOTICE  [sshd] Ban 185.74.4.189
...
2020-08-26 03:37:32

Recently Reported IPs

124.90.51.9 124.90.51.71 124.90.51.83 124.90.52.132
124.90.51.59 117.64.227.26 124.90.52.121 124.90.52.128
124.90.51.95 124.90.52.134 124.90.51.69 124.90.51.89
124.90.52.144 124.90.52.140 124.90.52.156 124.90.52.157
124.90.52.143 124.90.52.174 124.90.52.177 124.90.52.173