Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.124.74.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.124.74.157.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:48:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 157.74.124.136.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 157.74.124.136.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
187.32.178.33 attackbotsspam
Feb  6 19:57:13 *** sshd[24653]: Invalid user cje from 187.32.178.33
2020-02-07 04:42:39
103.23.119.47 attack
lfd: (smtpauth) Failed SMTP AUTH login from 103.23.119.47 (IN/India/-): 5 in the last 3600 secs - Fri Jul 20 03:37:38 2018
2020-02-07 05:22:32
157.245.252.2 attack
Feb  6 20:54:27 legacy sshd[13236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.2
Feb  6 20:54:30 legacy sshd[13236]: Failed password for invalid user sjs from 157.245.252.2 port 35514 ssh2
Feb  6 20:57:18 legacy sshd[13452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.2
...
2020-02-07 04:38:46
49.233.90.8 attack
Feb  6 16:56:44 ws24vmsma01 sshd[166038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8
Feb  6 16:56:45 ws24vmsma01 sshd[166038]: Failed password for invalid user okh from 49.233.90.8 port 42438 ssh2
...
2020-02-07 05:13:23
159.203.161.141 attackbots
Feb  6 21:53:17 debian-2gb-nbg1-2 kernel: \[3281640.825188\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=159.203.161.141 DST=195.201.40.59 LEN=48 TOS=0x00 PREC=0x00 TTL=117 ID=1666 PROTO=TCP SPT=57393 DPT=22 WINDOW=65535 RES=0x00 SYN URGP=0
2020-02-07 04:56:02
187.16.96.35 attackspam
Feb  6 21:44:29 MK-Soft-VM6 sshd[23117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.35 
Feb  6 21:44:32 MK-Soft-VM6 sshd[23117]: Failed password for invalid user fs from 187.16.96.35 port 40148 ssh2
...
2020-02-07 04:53:00
2.180.111.225 attackspam
20/2/6@14:57:19: FAIL: Alarm-Network address from=2.180.111.225
20/2/6@14:57:20: FAIL: Alarm-Network address from=2.180.111.225
...
2020-02-07 04:37:47
114.239.54.239 attackspambots
Brute force blocker - service: proftpd1 - aantal: 47 - Tue Jan  8 10:10:09 2019
2020-02-07 04:47:39
58.125.171.61 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 58.125.171.61 (KR/Republic of Korea/-): 5 in the last 3600 secs - Fri Dec  7 12:28:50 2018
2020-02-07 05:04:41
128.199.220.207 attackbotsspam
Feb  6 03:33:14 server sshd\[27055\]: Invalid user tdn from 128.199.220.207
Feb  6 03:33:14 server sshd\[27055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 
Feb  6 03:33:15 server sshd\[27055\]: Failed password for invalid user tdn from 128.199.220.207 port 50834 ssh2
Feb  6 22:57:02 server sshd\[1144\]: Invalid user tmg from 128.199.220.207
Feb  6 22:57:02 server sshd\[1144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.207 
...
2020-02-07 04:52:16
113.206.165.224 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 44 - Tue Jan  8 08:00:09 2019
2020-02-07 04:48:00
112.85.42.181 attackbotsspam
2020-02-06T22:06:41.849274centos sshd\[11484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
2020-02-06T22:06:43.186078centos sshd\[11484\]: Failed password for root from 112.85.42.181 port 37067 ssh2
2020-02-06T22:06:46.146714centos sshd\[11484\]: Failed password for root from 112.85.42.181 port 37067 ssh2
2020-02-07 05:11:34
31.42.3.122 attack
Automatic report - Port Scan Attack
2020-02-07 04:39:31
3.113.64.117 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-07 04:43:32
190.214.236.10 attackbotsspam
lfd: (smtpauth) Failed SMTP AUTH login from 190.214.236.10 (EC/Ecuador/10.236.214.190.static.anycast.cnt-grms.ec): 5 in the last 3600 secs - Fri Jul 20 03:36:23 2018
2020-02-07 05:22:07

Recently Reported IPs

213.42.216.203 213.61.233.242 131.203.70.84 158.1.212.56
219.230.135.123 253.85.166.250 142.56.179.11 5.102.147.12
58.170.81.192 189.75.142.117 85.98.185.99 63.152.17.17
189.229.30.192 5.97.199.245 252.168.13.73 6.254.26.139
192.73.5.118 91.44.172.203 162.211.204.14 78.238.156.108