Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.221.155.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52536
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.221.155.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:25:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 124.155.221.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.155.221.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.237.143.11 attackbots
Mar 17 02:25:46 src: 104.237.143.11 signature match: "SCAN UPnP communication attempt" (sid: 100074) udp port: 1900
2020-03-17 11:33:46
71.38.38.5 attackspambots
8080/tcp
[2020-03-16]1pkt
2020-03-17 11:21:24
186.4.123.139 attack
Invalid user ubuntu from 186.4.123.139 port 46381
2020-03-17 10:56:09
124.152.118.131 attack
$f2bV_matches
2020-03-17 10:51:02
106.13.101.220 attackspam
sshd jail - ssh hack attempt
2020-03-17 11:19:22
45.141.86.118 attackbots
RDP brute force attack detected by fail2ban
2020-03-17 10:49:33
207.148.109.214 attackspam
Wordpress Admin Login attack
2020-03-17 11:32:39
119.116.235.87 attackbotsspam
23/tcp
[2020-03-16]1pkt
2020-03-17 11:23:32
80.250.53.195 attackspambots
Unauthorised access (Mar 17) SRC=80.250.53.195 LEN=52 TTL=124 ID=12431 DF TCP DPT=445 WINDOW=8192 SYN
2020-03-17 11:25:51
118.70.81.215 attack
445/tcp
[2020-03-16]1pkt
2020-03-17 11:10:24
185.180.91.252 attackbots
Automatic report - Port Scan Attack
2020-03-17 11:31:44
211.195.27.173 attackbots
81/tcp
[2020-03-16]1pkt
2020-03-17 10:54:13
37.176.23.239 attackspambots
61672/udp
[2020-03-16]1pkt
2020-03-17 11:14:40
1.27.233.96 attackspambots
5555/tcp
[2020-03-16]1pkt
2020-03-17 11:26:49
114.118.22.191 attackbots
Mar 17 01:15:03 ns3042688 sshd\[28629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.22.191  user=www-data
Mar 17 01:15:05 ns3042688 sshd\[28629\]: Failed password for www-data from 114.118.22.191 port 40006 ssh2
Mar 17 01:16:50 ns3042688 sshd\[28763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.22.191  user=root
Mar 17 01:16:52 ns3042688 sshd\[28763\]: Failed password for root from 114.118.22.191 port 39684 ssh2
Mar 17 01:18:34 ns3042688 sshd\[28891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.118.22.191  user=root
...
2020-03-17 11:13:11

Recently Reported IPs

130.47.144.219 222.17.4.53 53.103.147.246 239.199.149.241
239.31.128.28 185.202.1.100 24.44.251.58 30.123.101.15
82.35.186.116 199.235.25.107 142.6.43.162 99.242.145.234
176.64.203.24 224.239.230.40 173.176.34.156 139.155.165.9
187.83.93.103 248.18.1.13 129.219.12.87 162.228.136.28