Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.145.142.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.145.142.124.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 16:46:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 124.142.145.221.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 124.142.145.221.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
42.114.65.51 attackspam
20/3/6@17:06:07: FAIL: IoT-Telnet address from=42.114.65.51
...
2020-03-07 06:35:07
176.32.34.6 attackspam
port scan and connect, tcp 22 (ssh)
2020-03-07 06:36:53
190.210.73.121 attackbotsspam
Mar  6 22:55:52 mail.srvfarm.net postfix/smtpd[2296747]: warning: unknown[190.210.73.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  6 22:55:52 mail.srvfarm.net postfix/smtpd[2296747]: lost connection after AUTH from unknown[190.210.73.121]
Mar  6 23:00:19 mail.srvfarm.net postfix/smtpd[2295108]: warning: unknown[190.210.73.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar  6 23:00:19 mail.srvfarm.net postfix/smtpd[2295108]: lost connection after AUTH from unknown[190.210.73.121]
Mar  6 23:05:26 mail.srvfarm.net postfix/smtpd[2298190]: warning: unknown[190.210.73.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-07 06:52:06
222.186.30.209 attack
Mar  6 23:53:45 ncomp sshd[4944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209  user=root
Mar  6 23:53:46 ncomp sshd[4944]: Failed password for root from 222.186.30.209 port 58134 ssh2
Mar  7 00:26:42 ncomp sshd[5566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209  user=root
Mar  7 00:26:44 ncomp sshd[5566]: Failed password for root from 222.186.30.209 port 52862 ssh2
2020-03-07 06:37:30
164.77.70.8 attack
2020-03-06 23:01:13 H=(dujyiesoj.com) [164.77.70.8]:62298 I=[10.100.18.25]:25 sender verify fail for : Unrouteable address
2020-03-06 x@x
2020-03-06 23:01:14 unexpected disconnection while reading SMTP command from (dujyiesoj.com) [164.77.70.8]:62298 I=[10.100.18.25]:25

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.77.70.8
2020-03-07 06:34:49
49.235.250.69 attackspam
Mar  6 14:05:35 mockhub sshd[27977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.250.69
Mar  6 14:05:37 mockhub sshd[27977]: Failed password for invalid user mailserver from 49.235.250.69 port 52834 ssh2
...
2020-03-07 06:50:42
92.118.38.58 attackbots
2020-03-06 23:14:50 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data
2020-03-06 23:20:25 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=egreen@no-server.de\)
2020-03-06 23:20:25 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=egreen@no-server.de\)
2020-03-06 23:20:30 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=egreen@no-server.de\)
2020-03-06 23:20:33 dovecot_login authenticator failed for \(User\) \[92.118.38.58\]: 535 Incorrect authentication data \(set_id=egreen@no-server.de\)
...
2020-03-07 06:38:06
45.82.33.240 attackbots
Mar  6 23:06:23 mail.srvfarm.net postfix/smtpd[2295108]: NOQUEUE: reject: RCPT from unknown[45.82.33.240]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 23:08:03 mail.srvfarm.net postfix/smtpd[2298191]: NOQUEUE: reject: RCPT from unknown[45.82.33.240]: 554 5.7.1 Service unavailable; Client host [45.82.33.240] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
Mar  6 23:08:43 mail.srvfarm.net postfix/smtpd[2311379]: NOQUEUE: reject: RCPT from unknown[45.82.33.240]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 23:13:09 mail.srvfarm.net postfix/smtpd[2310694]: NOQUEUE: reject: R
2020-03-07 07:02:24
167.71.57.61 attackspambots
Lines containing failures of 167.71.57.61
Mar  3 17:40:56 neweola sshd[21459]: Did not receive identification string from 167.71.57.61 port 50468
Mar  3 17:41:00 neweola sshd[21467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.57.61  user=r.r
Mar  3 17:41:02 neweola sshd[21467]: Failed password for r.r from 167.71.57.61 port 45056 ssh2
Mar  3 17:41:02 neweola sshd[21467]: Received disconnect from 167.71.57.61 port 45056:11: Normal Shutdown, Thank you for playing [preauth]
Mar  3 17:41:02 neweola sshd[21467]: Disconnected from authenticating user r.r 167.71.57.61 port 45056 [preauth]
Mar  3 17:41:12 neweola sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.57.61  user=r.r
Mar  3 17:41:13 neweola sshd[21494]: Failed password for r.r from 167.71.57.61 port 41286 ssh2
Mar  3 17:41:14 neweola sshd[21494]: Received disconnect from 167.71.57.61 port 41286:11: Normal Shut........
------------------------------
2020-03-07 07:03:34
92.63.194.106 attackbots
Mar  6 23:05:04 vps691689 sshd[3047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.106
Mar  6 23:05:06 vps691689 sshd[3047]: Failed password for invalid user user from 92.63.194.106 port 39723 ssh2
...
2020-03-07 07:09:46
50.70.229.239 attack
$f2bV_matches
2020-03-07 06:41:05
49.235.175.21 attack
SSH Brute-Force Attack
2020-03-07 06:47:56
69.229.6.54 attack
Mar  6 23:41:35 vps691689 sshd[4371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.54
Mar  6 23:41:37 vps691689 sshd[4371]: Failed password for invalid user uno85 from 69.229.6.54 port 51488 ssh2
Mar  6 23:47:38 vps691689 sshd[4558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.54
...
2020-03-07 06:52:47
78.128.113.67 attack
2020-03-06 23:50:32 dovecot_plain authenticator failed for \(\[78.128.113.67\]\) \[78.128.113.67\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
2020-03-06 23:50:39 dovecot_plain authenticator failed for \(\[78.128.113.67\]\) \[78.128.113.67\]: 535 Incorrect authentication data \(set_id=harald.schueller\)
2020-03-06 23:51:36 dovecot_plain authenticator failed for \(\[78.128.113.67\]\) \[78.128.113.67\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
2020-03-06 23:51:43 dovecot_plain authenticator failed for \(\[78.128.113.67\]\) \[78.128.113.67\]: 535 Incorrect authentication data \(set_id=harald.schueller\)
2020-03-06 23:58:42 dovecot_plain authenticator failed for \(\[78.128.113.67\]\) \[78.128.113.67\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
...
2020-03-07 06:59:29
139.59.95.117 attack
firewall-block, port(s): 5900/tcp
2020-03-07 06:31:23

Recently Reported IPs

116.11.180.53 200.144.118.73 232.31.99.193 48.71.43.222
119.81.63.67 191.249.238.103 164.122.244.59 165.198.25.104
125.52.144.147 175.55.168.158 246.222.205.233 117.204.164.13
159.114.91.160 125.92.246.122 251.10.156.41 236.144.52.194
97.125.197.240 9.172.110.209 97.104.108.220 42.23.192.115