Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: Amazon.com, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.124.54.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14260
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.124.54.9.			IN	A

;; AUTHORITY SECTION:
.			3334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071101 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 12 03:56:45 CST 2019
;; MSG SIZE  rcvd: 114
Host info
9.54.124.3.in-addr.arpa domain name pointer ec2-3-124-54-9.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
9.54.124.3.in-addr.arpa	name = ec2-3-124-54-9.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.46.133.60 attackspam
Unauthorized connection attempt from IP address 177.46.133.60 on Port 445(SMB)
2020-10-11 16:10:11
111.4.121.189 attack
Port Scan
...
2020-10-11 16:18:48
189.127.144.22 attackspambots
Unauthorized connection attempt detected from IP address 189.127.144.22 to port 80
2020-10-11 16:03:09
87.188.112.15 attackspam
5x Failed Password
2020-10-11 16:07:31
88.218.17.103 attack
Port scanning [3 denied]
2020-10-11 16:08:09
207.154.199.63 attackspam
Oct 11 09:44:32 relay postfix/smtpd\[17162\]: warning: unknown\[207.154.199.63\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 09:44:37 relay postfix/smtpd\[9480\]: warning: unknown\[207.154.199.63\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 09:49:20 relay postfix/smtpd\[10046\]: warning: unknown\[207.154.199.63\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 09:49:25 relay postfix/smtpd\[17194\]: warning: unknown\[207.154.199.63\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 09:54:08 relay postfix/smtpd\[17711\]: warning: unknown\[207.154.199.63\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-11 16:17:26
2.57.122.185 attackspambots
Unauthorized connection attempt detected from IP address 2.57.122.185 to port 81
2020-10-11 16:14:09
112.85.42.13 attackbotsspam
Oct 11 10:01:06 sso sshd[13545]: Failed password for root from 112.85.42.13 port 50540 ssh2
Oct 11 10:01:09 sso sshd[13545]: Failed password for root from 112.85.42.13 port 50540 ssh2
...
2020-10-11 16:04:01
83.227.11.180 attack
Port Scan: TCP/443
2020-10-11 16:23:07
5.188.86.174 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-11T06:57:06Z
2020-10-11 16:28:47
219.77.50.211 attackspam
Unauthorised access (Oct 10) SRC=219.77.50.211 LEN=40 TTL=50 ID=27882 TCP DPT=23 WINDOW=9692 SYN
2020-10-11 15:55:38
103.207.36.44 attackbots
[MK-VM5] Blocked by UFW
2020-10-11 16:02:08
81.68.239.140 attackspambots
Lines containing failures of 81.68.239.140
Oct  6 17:24:45 mellenthin sshd[30324]: User r.r from 81.68.239.140 not allowed because not listed in AllowUsers
Oct  6 17:24:45 mellenthin sshd[30324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.239.140  user=r.r
Oct  6 17:24:47 mellenthin sshd[30324]: Failed password for invalid user r.r from 81.68.239.140 port 40446 ssh2
Oct  6 17:24:47 mellenthin sshd[30324]: Received disconnect from 81.68.239.140 port 40446:11: Bye Bye [preauth]
Oct  6 17:24:47 mellenthin sshd[30324]: Disconnected from invalid user r.r 81.68.239.140 port 40446 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.68.239.140
2020-10-11 16:10:42
59.90.200.187 attack
Oct 11 04:39:43 sip sshd[9964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.90.200.187
Oct 11 04:39:45 sip sshd[9964]: Failed password for invalid user mary from 59.90.200.187 port 40426 ssh2
Oct 11 04:45:53 sip sshd[11648]: Failed password for root from 59.90.200.187 port 51086 ssh2
2020-10-11 16:13:14
109.72.100.77 attackspambots
Unauthorized connection attempt from IP address 109.72.100.77 on Port 445(SMB)
2020-10-11 16:08:53

Recently Reported IPs

108.89.198.25 94.182.234.139 187.47.72.29 193.95.85.70
194.7.159.134 216.197.56.164 40.204.4.37 109.51.95.172
146.242.37.91 200.183.16.203 42.91.44.245 112.229.152.126
24.82.33.175 64.63.227.157 211.248.180.121 62.90.49.63
175.2.51.240 74.11.101.199 135.214.216.57 182.169.39.212