Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.1.122.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30024
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.1.122.124.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:48:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 124.122.1.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.122.1.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
95.47.248.21 attack
unauthorized connection attempt
2020-01-09 13:19:01
83.232.8.83 attackspam
unauthorized connection attempt
2020-01-09 13:08:43
67.155.207.16 attack
unauthorized connection attempt
2020-01-09 13:19:53
213.108.112.171 attackbotsspam
unauthorized connection attempt
2020-01-09 13:22:54
179.223.92.166 attackspam
unauthorized connection attempt
2020-01-09 13:15:12
201.156.6.216 attackspam
unauthorized connection attempt
2020-01-09 13:30:31
187.175.35.45 attackbots
unauthorized connection attempt
2020-01-09 13:32:09
86.57.7.132 attack
[portscan] Port scan
2020-01-09 13:19:33
98.128.158.152 attack
unauthorized connection attempt
2020-01-09 13:07:04
189.234.30.92 attackspambots
unauthorized connection attempt
2020-01-09 13:13:54
85.97.192.163 attackspam
unauthorized connection attempt
2020-01-09 13:07:54
49.88.112.114 attackspambots
Jan  8 15:18:17 auw2 sshd\[4970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Jan  8 15:18:20 auw2 sshd\[4970\]: Failed password for root from 49.88.112.114 port 45521 ssh2
Jan  8 15:19:24 auw2 sshd\[5048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Jan  8 15:19:25 auw2 sshd\[5048\]: Failed password for root from 49.88.112.114 port 61627 ssh2
Jan  8 15:20:38 auw2 sshd\[5130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2020-01-09 09:22:04
98.128.130.63 attackspam
unauthorized connection attempt
2020-01-09 13:40:31
61.144.244.75 attack
unauthorized connection attempt
2020-01-09 13:20:09
49.35.203.97 attack
unauthorized connection attempt
2020-01-09 13:20:47

Recently Reported IPs

85.32.18.69 47.30.230.95 162.223.63.103 120.27.76.52
125.124.7.105 9.191.195.213 236.86.212.127 4.184.103.105
189.146.42.73 117.91.239.138 104.168.220.04 85.9.84.7
38.138.246.229 247.199.245.173 86.30.1.98 20.51.74.255
141.131.206.253 196.80.231.11 247.71.27.177 245.173.71.51