Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.124.162.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;61.124.162.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 08:39:47 CST 2025
;; MSG SIZE  rcvd: 107
Host info
106.162.124.61.in-addr.arpa domain name pointer ntkngw1286106.kngw.nt.ngn.ppp.infoweb.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.162.124.61.in-addr.arpa	name = ntkngw1286106.kngw.nt.ngn.ppp.infoweb.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.106.8.55 attackbotsspam
scans 2 times in preceeding hours on the ports (in chronological order) 40022 40022
2020-07-05 01:26:58
89.32.249.21 attackspambots
Automatic report - XMLRPC Attack
2020-07-05 01:28:51
14.99.18.206 attackspambots
Icarus honeypot on github
2020-07-05 01:39:19
160.155.113.19 attack
2020-07-04T18:44:19.873993vps773228.ovh.net sshd[2899]: Invalid user ts3srv from 160.155.113.19 port 49964
2020-07-04T18:44:19.880881vps773228.ovh.net sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.113.19
2020-07-04T18:44:19.873993vps773228.ovh.net sshd[2899]: Invalid user ts3srv from 160.155.113.19 port 49964
2020-07-04T18:44:21.513537vps773228.ovh.net sshd[2899]: Failed password for invalid user ts3srv from 160.155.113.19 port 49964 ssh2
2020-07-04T18:47:58.706004vps773228.ovh.net sshd[2945]: Invalid user joshua from 160.155.113.19 port 48337
...
2020-07-05 01:21:41
138.197.132.143 attackbotsspam
Jul  4 15:24:14 rocket sshd[30447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.132.143
Jul  4 15:24:15 rocket sshd[30447]: Failed password for invalid user unix from 138.197.132.143 port 59814 ssh2
...
2020-07-05 01:23:18
82.132.88.195 attack
07/04/2020-08:55:01.991016 82.132.88.195 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-05 01:10:18
165.22.143.3 attack
Jul  4 17:58:07 vmd48417 sshd[13545]: Failed password for root from 165.22.143.3 port 38632 ssh2
2020-07-05 01:32:31
195.54.167.55 attackbotsspam
What a wanker!
2020-07-05 01:20:17
124.205.119.183 attackbotsspam
Jul  4 14:32:16 inter-technics sshd[5784]: Invalid user cmsftp from 124.205.119.183 port 20889
Jul  4 14:32:16 inter-technics sshd[5784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.119.183
Jul  4 14:32:16 inter-technics sshd[5784]: Invalid user cmsftp from 124.205.119.183 port 20889
Jul  4 14:32:18 inter-technics sshd[5784]: Failed password for invalid user cmsftp from 124.205.119.183 port 20889 ssh2
Jul  4 14:33:37 inter-technics sshd[5853]: Invalid user guest from 124.205.119.183 port 2580
...
2020-07-05 01:14:28
173.205.13.236 attack
Jul  4 17:31:16 rotator sshd\[15916\]: Invalid user vlt from 173.205.13.236Jul  4 17:31:18 rotator sshd\[15916\]: Failed password for invalid user vlt from 173.205.13.236 port 47170 ssh2Jul  4 17:34:56 rotator sshd\[15961\]: Invalid user hyy from 173.205.13.236Jul  4 17:34:57 rotator sshd\[15961\]: Failed password for invalid user hyy from 173.205.13.236 port 45922 ssh2Jul  4 17:38:23 rotator sshd\[16750\]: Invalid user test from 173.205.13.236Jul  4 17:38:25 rotator sshd\[16750\]: Failed password for invalid user test from 173.205.13.236 port 44675 ssh2
...
2020-07-05 01:34:32
128.199.245.33 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-05 01:08:06
95.58.161.180 attackbotsspam
VNC brute force attack detected by fail2ban
2020-07-05 01:37:44
81.129.192.250 attackspambots
Jul  4 14:09:38 ns41 sshd[4918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.129.192.250
Jul  4 14:09:38 ns41 sshd[4920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.129.192.250
Jul  4 14:09:41 ns41 sshd[4918]: Failed password for invalid user pi from 81.129.192.250 port 40272 ssh2
Jul  4 14:09:41 ns41 sshd[4920]: Failed password for invalid user pi from 81.129.192.250 port 40276 ssh2
2020-07-05 01:36:42
31.132.151.46 attackspam
Jul  4 16:21:50 inter-technics sshd[13935]: Invalid user stats from 31.132.151.46 port 47495
Jul  4 16:21:50 inter-technics sshd[13935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.132.151.46
Jul  4 16:21:50 inter-technics sshd[13935]: Invalid user stats from 31.132.151.46 port 47495
Jul  4 16:21:52 inter-technics sshd[13935]: Failed password for invalid user stats from 31.132.151.46 port 47495 ssh2
Jul  4 16:25:50 inter-technics sshd[14166]: Invalid user contas from 31.132.151.46 port 58583
...
2020-07-05 01:35:08
5.252.212.254 attackbots
$f2bV_matches
2020-07-05 01:11:20

Recently Reported IPs

115.124.126.31 149.131.63.52 189.79.30.89 95.159.119.60
225.117.28.164 204.21.15.119 104.157.121.85 26.221.247.11
235.93.15.66 16.148.3.135 32.72.204.97 84.175.111.14
130.117.15.46 162.8.31.139 240.35.181.101 18.207.159.151
249.89.218.39 45.57.23.72 169.99.22.40 248.229.156.190