Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pretoria

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.146.124.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;165.146.124.123.		IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 156 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 20:00:57 CST 2020
;; MSG SIZE  rcvd: 119
Host info
123.124.146.165.in-addr.arpa domain name pointer dsl-165-146-124-123.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
123.124.146.165.in-addr.arpa	name = dsl-165-146-124-123.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.109.11.162 attack
SS5,WP GET /wp-login.php
2020-06-06 17:27:22
189.170.64.199 attack
Unauthorized connection attempt from IP address 189.170.64.199 on Port 445(SMB)
2020-06-06 17:39:00
27.72.104.121 attackbotsspam
Unauthorized connection attempt from IP address 27.72.104.121 on Port 445(SMB)
2020-06-06 18:02:47
125.19.208.6 attack
Unauthorized connection attempt from IP address 125.19.208.6 on Port 445(SMB)
2020-06-06 17:58:24
222.186.52.78 attackspam
$f2bV_matches
2020-06-06 17:28:30
52.172.4.141 attack
Jun  6 16:49:38 itv-usvr-02 sshd[28598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.4.141  user=root
Jun  6 16:51:43 itv-usvr-02 sshd[28656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.4.141  user=root
Jun  6 16:53:06 itv-usvr-02 sshd[28686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.4.141  user=root
2020-06-06 18:04:16
117.212.87.164 attack
Unauthorized connection attempt from IP address 117.212.87.164 on Port 445(SMB)
2020-06-06 17:41:12
159.89.199.229 attackbotsspam
SSH_attack
2020-06-06 17:40:47
182.74.86.27 attackspam
fail2ban -- 182.74.86.27
...
2020-06-06 17:41:54
14.231.204.243 attack
Unauthorized connection attempt from IP address 14.231.204.243 on Port 445(SMB)
2020-06-06 18:04:47
50.63.15.64 attack
RDPBruteGSL
2020-06-06 17:54:11
218.173.44.180 attackbots
Unauthorized connection attempt from IP address 218.173.44.180 on Port 445(SMB)
2020-06-06 17:24:27
49.68.225.36 attackspam
/HNAP1/
2020-06-06 18:01:09
14.165.118.105 attackbotsspam
Unauthorized connection attempt from IP address 14.165.118.105 on Port 445(SMB)
2020-06-06 17:23:41
77.211.73.146 attack
Unauthorized connection attempt from IP address 77.211.73.146 on Port 445(SMB)
2020-06-06 17:33:19

Recently Reported IPs

147.160.131.93 206.216.34.113 134.45.160.76 168.31.144.45
214.129.173.145 213.199.11.184 193.250.227.154 168.98.73.86
100.216.71.242 156.109.126.55 157.95.87.12 221.147.170.251
179.158.117.216 156.28.172.32 189.73.76.38 8.78.223.22
206.134.110.214 24.62.251.79 185.5.55.138 169.37.183.33