Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.124.31.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2380
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.124.31.100.			IN	A

;; AUTHORITY SECTION:
.			173	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:45:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
100.31.124.13.in-addr.arpa domain name pointer ec2-13-124-31-100.ap-northeast-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
100.31.124.13.in-addr.arpa	name = ec2-13-124-31-100.ap-northeast-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.166.90.5 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:33:33
223.202.201.210 attack
Nov 21 20:50:10 vps58358 sshd\[1604\]: Invalid user www from 223.202.201.210Nov 21 20:50:11 vps58358 sshd\[1604\]: Failed password for invalid user www from 223.202.201.210 port 53459 ssh2Nov 21 20:54:01 vps58358 sshd\[1650\]: Invalid user dennyl from 223.202.201.210Nov 21 20:54:03 vps58358 sshd\[1650\]: Failed password for invalid user dennyl from 223.202.201.210 port 41461 ssh2Nov 21 20:57:44 vps58358 sshd\[1681\]: Invalid user ssh555 from 223.202.201.210Nov 21 20:57:46 vps58358 sshd\[1681\]: Failed password for invalid user ssh555 from 223.202.201.210 port 57693 ssh2
...
2019-11-22 05:32:15
189.0.83.165 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-22 05:07:29
193.56.28.13 attack
Invalid user fuck from 193.56.28.13 port 52738
2019-11-22 05:18:04
218.92.0.202 attackspambots
Nov 21 21:54:14 MK-Soft-Root1 sshd[3030]: Failed password for root from 218.92.0.202 port 22317 ssh2
Nov 21 21:54:17 MK-Soft-Root1 sshd[3030]: Failed password for root from 218.92.0.202 port 22317 ssh2
...
2019-11-22 05:41:34
94.142.234.191 attackbotsspam
Nov 20 18:32:36 our-server-hostname postfix/smtpd[6041]: connect from unknown[94.142.234.191]
Nov x@x
Nov 20 18:32:37 our-server-hostname postfix/smtpd[6041]: lost connection after DATA from unknown[94.142.234.191]
Nov 20 18:32:37 our-server-hostname postfix/smtpd[6041]: disconnect from unknown[94.142.234.191]
Nov 20 18:51:45 our-server-hostname postfix/smtpd[6141]: connect from unknown[94.142.234.191]
Nov x@x
Nov x@x
Nov x@x
Nov 20 18:51:46 our-server-hostname postfix/smtpd[6141]: lost connection after DATA from unknown[94.142.234.191]
Nov 20 18:51:46 our-server-hostname postfix/smtpd[6141]: disconnect from unknown[94.142.234.191]
Nov 20 18:51:47 our-server-hostname postfix/smtpd[17577]: connect from unknown[94.142.234.191]
Nov x@x
Nov 20 18:51:49 our-server-hostname postfix/smtpd[17577]: lost connection after DATA from unknown[94.142.234.191]
Nov 20 18:51:49 our-server-hostname postfix/smtpd[17577]: disconnect from unknown[94.142.234.191]
Nov 20 18:51:50 our-server-ho........
-------------------------------
2019-11-22 05:12:51
114.47.127.238 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:22:23
149.202.18.204 attackbotsspam
Autoban   149.202.18.204 AUTH/CONNECT
2019-11-22 05:31:55
115.186.136.24 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 05:08:29
203.190.154.109 attack
Automatic report - Banned IP Access
2019-11-22 05:25:20
167.99.182.30 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-11-22 05:36:33
149.202.18.208 attack
Autoban   149.202.18.208 AUTH/CONNECT
2019-11-22 05:17:12
5.53.124.155 attackbots
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.53.124.155
2019-11-22 05:02:52
63.88.23.163 attackspambots
63.88.23.163 was recorded 16 times by 7 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 16, 89, 533
2019-11-22 05:23:04
63.88.23.166 attackbots
63.88.23.166 was recorded 16 times by 8 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 16, 83, 494
2019-11-22 05:31:05

Recently Reported IPs

13.124.125.97 13.124.248.144 13.124.39.200 13.124.30.176
13.124.221.166 13.124.232.185 13.124.52.200 13.124.45.116
13.124.53.214 13.124.41.111 13.124.61.92 13.124.58.136
13.124.78.7 104.21.66.220 13.124.48.37 13.124.73.123
13.124.95.241 13.125.10.65 13.124.79.31 13.125.102.36