Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.207.142.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.207.142.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:13:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 124.142.207.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.142.207.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
132.148.148.21 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-08 17:41:12
115.94.204.156 attackbots
Dec  8 10:17:58 MK-Soft-VM3 sshd[13269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156 
Dec  8 10:17:59 MK-Soft-VM3 sshd[13269]: Failed password for invalid user rh from 115.94.204.156 port 35526 ssh2
...
2019-12-08 17:24:01
51.38.238.87 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-08 17:23:22
182.61.37.35 attackbotsspam
Dec  8 08:53:55 SilenceServices sshd[11447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.35
Dec  8 08:53:58 SilenceServices sshd[11447]: Failed password for invalid user asterisk from 182.61.37.35 port 42847 ssh2
Dec  8 09:00:43 SilenceServices sshd[13502]: Failed password for mail from 182.61.37.35 port 44545 ssh2
2019-12-08 17:19:19
201.88.200.226 attackspam
Host Scan
2019-12-08 17:22:38
54.37.151.239 attackspam
Aug 11 16:16:50 vtv3 sshd[5582]: Invalid user db2inst1 from 54.37.151.239 port 45549
Aug 11 16:16:50 vtv3 sshd[5582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
Aug 11 16:16:52 vtv3 sshd[5582]: Failed password for invalid user db2inst1 from 54.37.151.239 port 45549 ssh2
Aug 11 16:21:01 vtv3 sshd[7658]: Invalid user wss from 54.37.151.239 port 53963
Aug 11 16:21:01 vtv3 sshd[7658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
Aug 11 16:33:28 vtv3 sshd[13709]: Invalid user deborah from 54.37.151.239 port 58820
Aug 11 16:33:28 vtv3 sshd[13709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
Aug 11 16:33:29 vtv3 sshd[13709]: Failed password for invalid user deborah from 54.37.151.239 port 58820 ssh2
Aug 11 16:37:44 vtv3 sshd[15951]: Invalid user aline from 54.37.151.239 port 43460
Aug 11 16:37:44 vtv3 sshd[15951]: pam_unix(sshd:auth): authentica
2019-12-08 17:31:49
39.105.75.2 attackspambots
Host Scan
2019-12-08 17:30:38
185.164.72.59 attack
185.164.72.59 was recorded 6 times by 6 hosts attempting to connect to the following ports: 11211. Incident counter (4h, 24h, all-time): 6, 31, 31
2019-12-08 17:48:09
117.81.232.87 attackbotsspam
Dec  8 09:48:04 ns41 sshd[5652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.81.232.87
2019-12-08 17:21:29
185.143.223.121 attackspambots
2019-12-08T10:10:40.182190+01:00 lumpi kernel: [1086189.363962] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.121 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=63227 PROTO=TCP SPT=41668 DPT=8526 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-08 17:34:05
106.53.19.224 attackbots
20 attempts against mh-ssh on echoip.magehost.pro
2019-12-08 17:11:38
37.187.79.117 attack
k+ssh-bruteforce
2019-12-08 17:43:23
177.92.16.186 attack
Dec  8 09:33:49 ns381471 sshd[25185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
Dec  8 09:33:51 ns381471 sshd[25185]: Failed password for invalid user rpc from 177.92.16.186 port 40176 ssh2
2019-12-08 17:38:45
177.69.221.75 attack
SSH bruteforce
2019-12-08 17:32:10
51.38.125.51 attack
SSH invalid-user multiple login attempts
2019-12-08 17:37:38

Recently Reported IPs

59.213.216.43 240.116.137.177 17.219.155.156 49.187.240.60
96.238.236.252 205.43.251.0 138.13.2.82 244.140.20.182
79.155.253.204 228.10.134.173 25.249.147.45 202.194.48.37
179.145.68.154 98.123.204.5 43.199.195.145 170.123.253.36
204.3.24.33 23.114.95.73 243.141.195.51 234.107.67.247