Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.139.124.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.139.124.30.			IN	A

;; AUTHORITY SECTION:
.			140	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:52:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
30.124.139.201.in-addr.arpa domain name pointer 124.139.201.in-addr.arpa.kiwinetworks.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.124.139.201.in-addr.arpa	name = 124.139.201.in-addr.arpa.kiwinetworks.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.220.107.124 attackspam
proto=tcp  .  spt=35998  .  dpt=25  .     (listed on  dnsbl-sorbs abuseat-org barracuda)     (468)
2019-09-11 01:43:30
157.230.214.150 attackbots
DATE:2019-09-10 18:47:14, IP:157.230.214.150, PORT:ssh brute force auth on SSH service (patata)
2019-09-11 02:44:58
60.170.166.177 attack
Telnet Server BruteForce Attack
2019-09-11 02:38:01
95.38.169.89 attackbotsspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 02:22:30
186.232.141.156 attack
Jun 16 20:16:12 mercury auth[9393]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=186.232.141.156
...
2019-09-11 02:48:30
49.234.206.45 attack
Sep 10 05:41:23 hiderm sshd\[3527\]: Invalid user developer from 49.234.206.45
Sep 10 05:41:23 hiderm sshd\[3527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.206.45
Sep 10 05:41:25 hiderm sshd\[3527\]: Failed password for invalid user developer from 49.234.206.45 port 49334 ssh2
Sep 10 05:49:17 hiderm sshd\[4268\]: Invalid user radio from 49.234.206.45
Sep 10 05:49:17 hiderm sshd\[4268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.206.45
2019-09-11 02:14:13
94.128.20.47 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-11 02:33:54
112.85.42.180 attackbotsspam
$f2bV_matches
2019-09-11 02:16:31
37.254.54.246 attack
Unauthorized connection attempt from IP address 37.254.54.246 on Port 445(SMB)
2019-09-11 02:11:43
178.128.144.227 attack
Sep 10 01:51:05 kapalua sshd\[24665\]: Invalid user support from 178.128.144.227
Sep 10 01:51:05 kapalua sshd\[24665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
Sep 10 01:51:07 kapalua sshd\[24665\]: Failed password for invalid user support from 178.128.144.227 port 48540 ssh2
Sep 10 01:57:06 kapalua sshd\[25309\]: Invalid user ftpuser from 178.128.144.227
Sep 10 01:57:06 kapalua sshd\[25309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
2019-09-11 02:51:35
160.153.147.136 attack
May 18 11:25:07 mercury wordpress(lukegirvin.co.uk)[1004]: XML-RPC authentication failure for luke from 160.153.147.136
...
2019-09-11 02:50:00
46.244.90.124 attack
Unauthorized connection attempt from IP address 46.244.90.124 on Port 445(SMB)
2019-09-11 02:35:50
62.4.55.144 attackspambots
Unauthorized connection attempt from IP address 62.4.55.144 on Port 445(SMB)
2019-09-11 02:41:23
103.253.107.43 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-11 01:44:55
45.80.64.246 attack
2019-09-10T18:08:39.426484abusebot-4.cloudsearch.cf sshd\[14155\]: Invalid user 1qaz2wsx from 45.80.64.246 port 54104
2019-09-11 02:28:04

Recently Reported IPs

194.135.22.22 95.182.107.36 221.1.223.50 180.137.136.107
176.59.56.172 37.0.11.6 35.233.210.94 73.221.106.68
113.89.40.244 5.188.255.61 88.136.80.153 194.135.96.226
157.34.177.159 183.109.167.77 179.156.201.87 200.122.243.250
112.2.98.71 123.118.73.214 142.93.48.117 45.185.137.15