Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Puerto Rico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.1.157.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.1.157.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011101 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 12:52:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 124.157.1.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 199.1.157.124.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
2.187.94.31 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-02-02 05:15:55
49.88.112.113 attackbotsspam
Feb  1 11:06:54 web9 sshd\[16626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Feb  1 11:06:56 web9 sshd\[16626\]: Failed password for root from 49.88.112.113 port 41918 ssh2
Feb  1 11:06:58 web9 sshd\[16626\]: Failed password for root from 49.88.112.113 port 41918 ssh2
Feb  1 11:07:00 web9 sshd\[16626\]: Failed password for root from 49.88.112.113 port 41918 ssh2
Feb  1 11:07:52 web9 sshd\[16728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2020-02-02 05:08:58
125.21.123.234 attack
Automatic report - Banned IP Access
2020-02-02 05:18:50
140.238.39.56 attackspambots
Jan 11 05:52:17 v22018076590370373 sshd[8721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.39.56 
...
2020-02-02 05:04:42
141.105.111.230 attackspam
Jan  5 18:01:17 v22018076590370373 sshd[14061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.111.230 
...
2020-02-02 04:47:00
222.255.129.133 attackspam
Unauthorized connection attempt detected from IP address 222.255.129.133 to port 2220 [J]
2020-02-02 04:46:21
183.82.4.77 attackbotsspam
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-02-02 04:48:35
140.246.215.19 attackspambots
Unauthorized connection attempt detected from IP address 140.246.215.19 to port 2220 [J]
2020-02-02 04:57:37
46.101.242.128 attack
Unauthorized connection attempt detected from IP address 46.101.242.128 to port 23 [J]
2020-02-02 05:09:26
140.143.98.35 attackspam
Unauthorized connection attempt detected from IP address 140.143.98.35 to port 2220 [J]
2020-02-02 05:10:12
140.143.72.21 attackbots
Dec 13 04:43:07 v22018076590370373 sshd[18010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.72.21 
...
2020-02-02 05:14:56
140.143.73.184 attack
Invalid user mahanth from 140.143.73.184 port 35806
2020-02-02 05:14:43
140.186.85.215 attackspambots
...
2020-02-02 05:07:33
122.14.213.124 attackspambots
Unauthorized connection attempt detected from IP address 122.14.213.124 to port 2220 [J]
2020-02-02 05:15:30
187.1.74.79 attack
Unauthorized connection attempt detected from IP address 187.1.74.79 to port 80 [J]
2020-02-02 04:59:19

Recently Reported IPs

179.63.103.172 69.167.31.205 232.218.110.11 8.62.6.98
29.194.67.60 86.150.191.102 244.200.117.100 77.57.142.233
197.237.145.148 55.3.39.46 7.251.205.5 233.140.160.133
8.104.142.131 73.0.5.134 13.13.111.148 243.138.223.121
46.21.133.155 166.140.239.45 121.109.178.234 203.203.211.136