Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.90.53.117 attack
Unauthorized connection attempt detected from IP address 124.90.53.117 to port 8123 [J]
2020-03-02 14:58:23
124.90.53.192 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5433b18c5dbc9406 | WAF_Rule_ID: 1112825 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:52:16
124.90.53.53 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410570a3a7a9629 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.081397758 Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:49:39
124.90.53.173 attack
The IP has triggered Cloudflare WAF. CF-Ray: 540fa701ee9a2808 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 02:15:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.90.53.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.90.53.162.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 00:37:14 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 162.53.90.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.53.90.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.47.52.142 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/177.47.52.142/ 
 
 BR - 1H : (149)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN28652 
 
 IP : 177.47.52.142 
 
 CIDR : 177.47.48.0/21 
 
 PREFIX COUNT : 24 
 
 UNIQUE IP COUNT : 24064 
 
 
 ATTACKS DETECTED ASN28652 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-23 07:22:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-23 19:29:38
106.12.56.17 attack
Nov 23 08:12:52 localhost sshd\[108193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.17  user=backup
Nov 23 08:12:54 localhost sshd\[108193\]: Failed password for backup from 106.12.56.17 port 53840 ssh2
Nov 23 08:18:05 localhost sshd\[108311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.17  user=root
Nov 23 08:18:06 localhost sshd\[108311\]: Failed password for root from 106.12.56.17 port 59488 ssh2
Nov 23 08:23:18 localhost sshd\[108443\]: Invalid user vt100 from 106.12.56.17 port 36934
...
2019-11-23 19:19:38
118.121.204.10 attackspam
Nov 22 22:37:54 wbs sshd\[12890\]: Invalid user wwwadmin from 118.121.204.10
Nov 22 22:37:54 wbs sshd\[12890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.121.204.10
Nov 22 22:37:57 wbs sshd\[12890\]: Failed password for invalid user wwwadmin from 118.121.204.10 port 33912 ssh2
Nov 22 22:43:18 wbs sshd\[13470\]: Invalid user anshu from 118.121.204.10
Nov 22 22:43:18 wbs sshd\[13470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.121.204.10
2019-11-23 19:13:00
51.79.68.99 attackspam
leo_www
2019-11-23 19:08:54
220.170.193.112 attackspam
Nov 23 07:17:51 pornomens sshd\[28333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.170.193.112  user=root
Nov 23 07:17:53 pornomens sshd\[28333\]: Failed password for root from 220.170.193.112 port 50327 ssh2
Nov 23 07:22:56 pornomens sshd\[28370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.170.193.112  user=sync
...
2019-11-23 19:20:51
209.124.66.24 attack
Automatic report - XMLRPC Attack
2019-11-23 19:44:50
51.89.151.214 attackspambots
Nov 23 14:10:19 areeb-Workstation sshd[5128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.151.214
Nov 23 14:10:21 areeb-Workstation sshd[5128]: Failed password for invalid user miharu from 51.89.151.214 port 44764 ssh2
...
2019-11-23 19:37:32
81.12.159.146 attackbotsspam
Nov 23 12:10:23 v22018076622670303 sshd\[3848\]: Invalid user admin from 81.12.159.146 port 60118
Nov 23 12:10:23 v22018076622670303 sshd\[3848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.159.146
Nov 23 12:10:25 v22018076622670303 sshd\[3848\]: Failed password for invalid user admin from 81.12.159.146 port 60118 ssh2
...
2019-11-23 19:16:09
119.29.11.242 attack
SSH Brute Force, server-1 sshd[25210]: Failed password for invalid user minecraft from 119.29.11.242 port 33746 ssh2
2019-11-23 19:12:02
179.110.177.233 attack
Automatic report - Port Scan Attack
2019-11-23 19:35:39
220.143.84.151 attack
Sat Nov 23 12:00:11 2019 \[pid 21083\] \[anonymous\] FAIL LOGIN: Client "220.143.84.151"
Sat Nov 23 12:01:08 2019 \[pid 21401\] \[opso\] FAIL LOGIN: Client "220.143.84.151"
Sat Nov 23 12:01:47 2019 \[pid 21562\] \[opso\] FAIL LOGIN: Client "220.143.84.151"
Sat Nov 23 12:02:52 2019 \[pid 21620\] \[www\] FAIL LOGIN: Client "220.143.84.151"
Sat Nov 23 12:03:55 2019 \[pid 21790\] \[www\] FAIL LOGIN: Client "220.143.84.151"
2019-11-23 19:33:47
118.36.150.234 attackbotsspam
RDP Brute-Force (Grieskirchen RZ2)
2019-11-23 19:25:48
104.248.126.170 attackspam
Nov 23 01:34:09 auw2 sshd\[5657\]: Invalid user dalzell from 104.248.126.170
Nov 23 01:34:09 auw2 sshd\[5657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.126.170
Nov 23 01:34:11 auw2 sshd\[5657\]: Failed password for invalid user dalzell from 104.248.126.170 port 53920 ssh2
Nov 23 01:37:34 auw2 sshd\[5913\]: Invalid user gilbertina from 104.248.126.170
Nov 23 01:37:34 auw2 sshd\[5913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.126.170
2019-11-23 19:41:47
106.13.52.159 attackbots
SSH Bruteforce attack
2019-11-23 19:27:22
108.36.110.110 attackbotsspam
Nov 23 10:36:27 eventyay sshd[8956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.36.110.110
Nov 23 10:36:29 eventyay sshd[8956]: Failed password for invalid user vanderheyden from 108.36.110.110 port 51214 ssh2
Nov 23 10:42:40 eventyay sshd[9071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.36.110.110
...
2019-11-23 19:15:15

Recently Reported IPs

117.64.227.70 124.90.53.141 124.90.53.197 124.90.53.172
124.90.53.199 124.90.53.204 124.90.53.206 124.90.53.229
124.90.53.243 124.90.53.251 124.90.53.235 117.64.228.184
124.90.53.24 124.90.53.38 124.90.53.44 124.90.53.46
124.90.53.34 124.90.53.78 124.90.53.5 124.90.53.47