Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: Advanced Info Service Public Company Limited

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Unauthorized IMAP connection attempt
2020-08-08 13:43:59
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.22.124.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18718
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;184.22.124.139.			IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 08 13:43:53 CST 2020
;; MSG SIZE  rcvd: 118
Host info
139.124.22.184.in-addr.arpa domain name pointer 184-22-124-0.24.nat.tls1b-cgn03.myaisfibre.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.124.22.184.in-addr.arpa	name = 184-22-124-0.24.nat.tls1b-cgn03.myaisfibre.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
190.206.223.226 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:46.
2019-10-12 09:04:38
77.247.110.220 attackspam
SIP Server BruteForce Attack
2019-10-12 09:02:11
187.188.162.78 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:42.
2019-10-12 09:12:12
180.183.65.90 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:36.
2019-10-12 09:26:39
197.210.57.199 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:49.
2019-10-12 08:56:36
37.145.76.229 attack
Unauthorized connection attempt from IP address 37.145.76.229 on Port 445(SMB)
2019-10-12 08:52:29
170.81.191.249 attack
Unauthorized connection attempt from IP address 170.81.191.249 on Port 445(SMB)
2019-10-12 09:24:15
189.189.252.198 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:43.
2019-10-12 09:11:08
212.145.231.149 attackspam
Invalid user pi from 212.145.231.149 port 53377
2019-10-12 09:29:22
46.172.8.106 attack
SMB Server BruteForce Attack
2019-10-12 08:59:12
111.250.84.80 attackbotsspam
[portscan] Port scan
2019-10-12 09:01:40
190.79.93.146 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:48.
2019-10-12 09:00:41
67.55.92.89 attack
Oct 11 20:56:37 vps647732 sshd[5999]: Failed password for root from 67.55.92.89 port 52752 ssh2
...
2019-10-12 09:09:45
209.45.97.4 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:53.
2019-10-12 08:50:24
103.105.227.75 attack
Unauthorized connection attempt from IP address 103.105.227.75 on Port 445(SMB)
2019-10-12 08:51:07

Recently Reported IPs

105.66.130.72 211.239.223.129 88.218.16.235 153.246.18.166
60.78.23.126 141.154.241.170 211.48.212.130 87.171.177.254
40.222.11.186 63.106.200.251 64.222.90.30 70.62.119.138
149.40.48.14 62.112.97.197 45.227.190.139 167.92.20.195
213.62.163.43 168.153.41.54 209.248.23.124 181.94.216.52