Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.90.52.214 attackspambots
Web Server Scan. RayID: 58f1c6a568b293c4, UA: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36, Country: CN
2020-05-21 03:59:29
124.90.52.158 attackbots
Fail2Ban Ban Triggered
2020-04-16 14:48:59
124.90.52.243 attackspam
Unauthorized connection attempt detected from IP address 124.90.52.243 to port 8081 [J]
2020-01-26 05:00:54
124.90.52.189 attack
Unauthorized connection attempt detected from IP address 124.90.52.189 to port 82 [T]
2020-01-10 08:46:03
124.90.52.114 attackspambots
Unauthorized connection attempt detected from IP address 124.90.52.114 to port 3128
2019-12-31 07:33:14
124.90.52.137 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5414e5dd78c695f3 | WAF_Rule_ID: 1112824 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; U; Android 4.3; en-us; SM-N900T Build/JSS15J) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:31:03
124.90.52.118 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5416098bfab493ac | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.082584686 Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:09:19
124.90.52.86 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 541380e48a61ed3b | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.064213590 Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 01:54:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.90.52.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.90.52.121.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030801 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 00:37:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 121.52.90.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.52.90.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.170.186 attack
Apr 12 07:33:16 mout sshd[679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.170.186  user=root
Apr 12 07:33:17 mout sshd[679]: Failed password for root from 104.248.170.186 port 40575 ssh2
2020-04-12 16:16:41
140.238.11.8 attackspam
Apr 12 08:12:59 plex sshd[3589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.11.8  user=root
Apr 12 08:13:01 plex sshd[3589]: Failed password for root from 140.238.11.8 port 35764 ssh2
2020-04-12 16:58:42
212.64.8.10 attack
prod11
...
2020-04-12 16:33:51
85.192.138.149 attackbotsspam
Invalid user user from 85.192.138.149 port 34888
2020-04-12 17:02:24
116.10.133.73 attackbotsspam
Unauthorized connection attempt detected from IP address 116.10.133.73 to port 23 [T]
2020-04-12 16:48:22
94.191.25.132 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-04-12 16:17:13
123.195.99.9 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-12 16:24:26
163.172.230.4 attackbotsspam
[2020-04-12 04:13:58] NOTICE[12114][C-00004c3a] chan_sip.c: Call from '' (163.172.230.4:59791) to extension '-011972592277524' rejected because extension not found in context 'public'.
[2020-04-12 04:13:58] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T04:13:58.300-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="-011972592277524",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/59791",ACLName="no_extension_match"
[2020-04-12 04:18:08] NOTICE[12114][C-00004c40] chan_sip.c: Call from '' (163.172.230.4:51698) to extension '61011972592277524' rejected because extension not found in context 'public'.
[2020-04-12 04:18:08] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T04:18:08.121-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="61011972592277524",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress=
...
2020-04-12 16:28:20
170.247.41.247 attackspam
SpamScore above: 10.0
2020-04-12 16:49:40
45.253.26.216 attackspam
(sshd) Failed SSH login from 45.253.26.216 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 12 06:45:27 s1 sshd[13744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.253.26.216  user=root
Apr 12 06:45:29 s1 sshd[13744]: Failed password for root from 45.253.26.216 port 38134 ssh2
Apr 12 06:50:48 s1 sshd[13893]: Invalid user system from 45.253.26.216 port 35136
Apr 12 06:50:49 s1 sshd[13893]: Failed password for invalid user system from 45.253.26.216 port 35136 ssh2
Apr 12 06:52:18 s1 sshd[13933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.253.26.216  user=root
2020-04-12 16:45:42
185.234.217.64 attackspambots
Brute Force
2020-04-12 16:40:57
142.4.214.151 attack
2020-04-12T04:03:29.188545shield sshd\[12651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns527892.ip-142-4-214.net  user=root
2020-04-12T04:03:30.678369shield sshd\[12651\]: Failed password for root from 142.4.214.151 port 35186 ssh2
2020-04-12T04:07:06.555624shield sshd\[13159\]: Invalid user admin from 142.4.214.151 port 43262
2020-04-12T04:07:06.559210shield sshd\[13159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns527892.ip-142-4-214.net
2020-04-12T04:07:08.175336shield sshd\[13159\]: Failed password for invalid user admin from 142.4.214.151 port 43262 ssh2
2020-04-12 16:28:57
189.209.135.214 attack
Scanning an empty webserver with deny all robots.txt
2020-04-12 16:52:48
134.209.238.119 attackbots
2020-04-12T02:47:46.133676linuxbox-skyline sshd[69266]: Invalid user user1 from 134.209.238.119 port 43804
...
2020-04-12 17:00:14
188.163.99.212 attackspam
(sshd) Failed SSH login from 188.163.99.212 (UA/Ukraine/188-163-99-212.broadband.kyivstar.net): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 12 09:36:43 ubnt-55d23 sshd[14024]: Invalid user upload from 188.163.99.212 port 54637
Apr 12 09:36:46 ubnt-55d23 sshd[14024]: Failed password for invalid user upload from 188.163.99.212 port 54637 ssh2
2020-04-12 16:17:54

Recently Reported IPs

117.64.227.26 124.90.52.128 124.90.51.95 124.90.52.134
124.90.51.69 124.90.51.89 124.90.52.144 124.90.52.140
124.90.52.156 124.90.52.157 124.90.52.143 124.90.52.174
124.90.52.177 124.90.52.173 117.64.227.38 124.90.52.18
124.90.52.162 124.90.52.186 124.90.52.180 124.90.52.206