Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
124.90.53.117 attack
Unauthorized connection attempt detected from IP address 124.90.53.117 to port 8123 [J]
2020-03-02 14:58:23
124.90.53.192 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5433b18c5dbc9406 | WAF_Rule_ID: 1112825 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 03:52:16
124.90.53.53 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5410570a3a7a9629 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: ip.skk.moe | User-Agent: Mozilla/5.081397758 Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:49:39
124.90.53.173 attack
The IP has triggered Cloudflare WAF. CF-Ray: 540fa701ee9a2808 | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: api.skk.moe | User-Agent: Mozilla/4.049897920 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 02:15:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.90.53.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.90.53.96.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030801 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 00:37:20 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 96.53.90.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.53.90.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.227.26.90 attack
Dec 10 01:59:07 home sshd[10175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.227.26.90  user=root
Dec 10 01:59:09 home sshd[10175]: Failed password for root from 122.227.26.90 port 40618 ssh2
Dec 10 02:09:42 home sshd[10269]: Invalid user tomcat from 122.227.26.90 port 47977
Dec 10 02:09:42 home sshd[10269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.227.26.90
Dec 10 02:09:42 home sshd[10269]: Invalid user tomcat from 122.227.26.90 port 47977
Dec 10 02:09:44 home sshd[10269]: Failed password for invalid user tomcat from 122.227.26.90 port 47977 ssh2
Dec 10 02:15:39 home sshd[10291]: Invalid user guest from 122.227.26.90 port 43984
Dec 10 02:15:39 home sshd[10291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.227.26.90
Dec 10 02:15:39 home sshd[10291]: Invalid user guest from 122.227.26.90 port 43984
Dec 10 02:15:40 home sshd[10291]: Failed password for invalid user g
2019-12-10 20:43:39
45.141.84.29 attackspam
firewall-block, port(s): 3461/tcp
2019-12-10 20:22:58
139.59.180.53 attackbotsspam
$f2bV_matches
2019-12-10 20:36:21
115.231.231.3 attackbots
Dec 10 13:05:56 sso sshd[30009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3
Dec 10 13:05:59 sso sshd[30009]: Failed password for invalid user malachy from 115.231.231.3 port 42182 ssh2
...
2019-12-10 20:11:26
36.189.253.226 attack
21 attempts against mh-ssh on echoip.magehost.pro
2019-12-10 20:26:45
93.84.86.69 attackspam
SSH Brute Force, server-1 sshd[17884]: Failed password for invalid user avis from 93.84.86.69 port 52414 ssh2
2019-12-10 20:51:40
139.59.247.114 attack
2019-12-10T07:30:06.324834abusebot-6.cloudsearch.cf sshd\[8140\]: Invalid user sdb from 139.59.247.114 port 32769
2019-12-10 20:21:28
37.49.227.109 attackbots
12/10/2019-07:34:07.736814 37.49.227.109 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 33
2019-12-10 20:37:27
138.255.204.13 attackspam
Automatic report - Banned IP Access
2019-12-10 20:28:44
123.114.202.25 attack
Host Scan
2019-12-10 20:14:38
58.213.166.140 attack
Unauthorized SSH login attempts
2019-12-10 20:33:08
188.113.174.55 attackspam
Dec 10 15:17:48 server sshd\[4879\]: Invalid user salano from 188.113.174.55
Dec 10 15:17:48 server sshd\[4879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.113.174.55 
Dec 10 15:17:50 server sshd\[4879\]: Failed password for invalid user salano from 188.113.174.55 port 48098 ssh2
Dec 10 15:27:15 server sshd\[7481\]: Invalid user minoru from 188.113.174.55
Dec 10 15:27:15 server sshd\[7481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.113.174.55 
...
2019-12-10 20:30:22
45.224.28.70 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps or Hacking.
2019-12-10 20:50:13
23.160.192.152 attack
Web App Attack
2019-12-10 20:17:46
219.93.20.155 attackspambots
2019-12-10T13:20:26.321625scmdmz1 sshd\[9633\]: Invalid user test from 219.93.20.155 port 53929
2019-12-10T13:20:26.324348scmdmz1 sshd\[9633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.20.155
2019-12-10T13:20:28.148511scmdmz1 sshd\[9633\]: Failed password for invalid user test from 219.93.20.155 port 53929 ssh2
...
2019-12-10 20:24:32

Recently Reported IPs

124.90.53.8 124.90.53.97 124.90.53.88 117.64.229.244
124.90.54.106 124.90.54.112 124.90.54.12 124.90.54.135
124.90.54.144 117.64.229.93 124.90.54.160 124.90.54.18
124.90.54.191 124.90.54.199 124.90.54.151 124.90.54.198
124.90.54.162 124.90.54.156 124.90.54.212 124.90.54.227