Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.98.124.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.98.124.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 13:36:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 113.124.98.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.124.98.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.36.245.133 attack
Invalid user admin from 59.36.245.133 port 57187
2020-01-19 01:19:27
51.255.35.41 attack
$f2bV_matches
2020-01-19 01:19:45
72.255.55.222 attack
Invalid user admin from 72.255.55.222 port 47404
2020-01-19 01:17:52
188.252.31.162 attackbots
Unauthorized connection attempt detected from IP address 188.252.31.162 to port 2220 [J]
2020-01-19 01:34:14
41.35.62.205 attackspambots
Email server abuse
2020-01-19 01:22:50
92.124.128.100 attackspam
Invalid user admin from 92.124.128.100 port 36858
2020-01-19 01:58:13
14.161.5.70 attack
Autoban   14.161.5.70 AUTH/CONNECT
2020-01-19 01:25:55
106.13.105.88 attack
Invalid user abc from 106.13.105.88 port 41984
2020-01-19 01:53:48
50.81.5.127 attack
Unauthorized connection attempt detected from IP address 50.81.5.127 to port 2220 [J]
2020-01-19 01:20:42
156.219.203.210 attackbots
Invalid user admin from 156.219.203.210 port 34844
2020-01-19 01:42:10
138.197.113.240 attackbots
Jan 18 14:50:00 dedicated sshd[29251]: Invalid user plex from 138.197.113.240 port 33989
2020-01-19 01:45:15
27.72.138.189 attackspambots
Invalid user admin from 27.72.138.189 port 58700
2020-01-19 01:25:24
5.135.185.27 attackbots
Unauthorized connection attempt detected from IP address 5.135.185.27 to port 2220 [J]
2020-01-19 01:26:49
200.105.234.131 attack
2020-01-18T18:18:49.808675scmdmz1 sshd[11407]: Invalid user pi from 200.105.234.131 port 34540
2020-01-18T18:18:49.808686scmdmz1 sshd[11408]: Invalid user pi from 200.105.234.131 port 34542
2020-01-18T18:18:49.986449scmdmz1 sshd[11408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=corp-200-105-234-131.uio.puntonet.ec
2020-01-18T18:18:49.808686scmdmz1 sshd[11408]: Invalid user pi from 200.105.234.131 port 34542
2020-01-18T18:18:51.653009scmdmz1 sshd[11408]: Failed password for invalid user pi from 200.105.234.131 port 34542 ssh2
2020-01-18T18:18:49.998336scmdmz1 sshd[11407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=corp-200-105-234-131.uio.puntonet.ec
2020-01-18T18:18:49.808675scmdmz1 sshd[11407]: Invalid user pi from 200.105.234.131 port 34540
2020-01-18T18:18:51.653334scmdmz1 sshd[11407]: Failed password for invalid user pi from 200.105.234.131 port 34540 ssh2
...
2020-01-19 01:31:14
178.32.121.111 attackspam
Invalid user ochsner from 178.32.121.111 port 42194
2020-01-19 01:39:48

Recently Reported IPs

45.133.241.187 168.97.150.26 84.120.237.101 113.96.27.205
19.121.127.193 130.146.176.76 96.6.203.236 253.107.67.168
32.141.130.236 231.86.111.11 12.127.27.28 219.7.207.105
54.123.18.73 181.202.16.97 177.127.115.57 181.35.172.235
38.82.84.221 99.105.45.28 128.126.173.57 205.172.229.11