Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bangkok

Region: Bangkok

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.180.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.20.180.241.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 15:32:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 241.180.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.180.20.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.49.239 attackbotsspam
Invalid user testor from 178.128.49.239 port 52562
2020-04-23 14:31:01
139.199.14.105 attackspam
Invalid user test1 from 139.199.14.105 port 59484
2020-04-23 14:20:10
51.38.130.242 attackbots
ssh brute force
2020-04-23 14:24:43
106.12.200.70 attackbotsspam
Apr 23 08:13:25 OPSO sshd\[408\]: Invalid user nw from 106.12.200.70 port 44526
Apr 23 08:13:25 OPSO sshd\[408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.200.70
Apr 23 08:13:28 OPSO sshd\[408\]: Failed password for invalid user nw from 106.12.200.70 port 44526 ssh2
Apr 23 08:17:28 OPSO sshd\[1320\]: Invalid user testor from 106.12.200.70 port 51216
Apr 23 08:17:28 OPSO sshd\[1320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.200.70
2020-04-23 14:36:46
23.92.225.228 attackbotsspam
Invalid user ug from 23.92.225.228 port 54825
2020-04-23 14:12:23
189.7.217.23 attackbotsspam
Apr 23 06:06:13 srv01 sshd[18216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.217.23  user=root
Apr 23 06:06:15 srv01 sshd[18216]: Failed password for root from 189.7.217.23 port 49193 ssh2
Apr 23 06:08:29 srv01 sshd[18426]: Invalid user tg from 189.7.217.23 port 56445
Apr 23 06:08:29 srv01 sshd[18426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.217.23
Apr 23 06:08:29 srv01 sshd[18426]: Invalid user tg from 189.7.217.23 port 56445
Apr 23 06:08:30 srv01 sshd[18426]: Failed password for invalid user tg from 189.7.217.23 port 56445 ssh2
...
2020-04-23 14:28:01
1.71.140.71 attackspambots
Apr 23 08:26:58 163-172-32-151 sshd[31166]: Invalid user sb from 1.71.140.71 port 38880
...
2020-04-23 14:35:05
139.178.68.119 attack
2020-04-23T05:33:43.385028abusebot-4.cloudsearch.cf sshd[5449]: Invalid user gk from 139.178.68.119 port 37164
2020-04-23T05:33:43.394605abusebot-4.cloudsearch.cf sshd[5449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.178.68.119
2020-04-23T05:33:43.385028abusebot-4.cloudsearch.cf sshd[5449]: Invalid user gk from 139.178.68.119 port 37164
2020-04-23T05:33:45.498423abusebot-4.cloudsearch.cf sshd[5449]: Failed password for invalid user gk from 139.178.68.119 port 37164 ssh2
2020-04-23T05:38:13.537453abusebot-4.cloudsearch.cf sshd[5681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.178.68.119  user=root
2020-04-23T05:38:15.039246abusebot-4.cloudsearch.cf sshd[5681]: Failed password for root from 139.178.68.119 port 58590 ssh2
2020-04-23T05:42:02.787958abusebot-4.cloudsearch.cf sshd[5874]: Invalid user sw from 139.178.68.119 port 44902
...
2020-04-23 14:28:19
175.141.247.190 attackbots
Invalid user cy from 175.141.247.190 port 56650
2020-04-23 14:02:59
49.234.28.109 attackspambots
Apr 23 06:59:57 ns381471 sshd[10707]: Failed password for root from 49.234.28.109 port 49016 ssh2
2020-04-23 14:14:28
182.73.196.163 attackspam
port scan and connect, tcp 443 (https)
2020-04-23 14:05:16
49.234.232.46 attackspambots
Apr 23 06:53:45 legacy sshd[9223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.232.46
Apr 23 06:53:47 legacy sshd[9223]: Failed password for invalid user jk from 49.234.232.46 port 59884 ssh2
Apr 23 06:57:40 legacy sshd[9427]: Failed password for root from 49.234.232.46 port 45546 ssh2
...
2020-04-23 14:29:07
103.18.248.32 attackspambots
Invalid user co from 103.18.248.32 port 44244
2020-04-23 13:58:19
220.167.224.133 attackspambots
Unauthorized connection attempt detected from IP address 220.167.224.133 to port 445 [T]
2020-04-23 14:06:52
106.13.18.140 attackbots
ssh brute force
2020-04-23 14:10:45

Recently Reported IPs

1.20.180.212 1.20.207.31 1.201.160.168 1.202.113.5
1.204.80.243 1.206.228.230 1.214.211.84 193.233.121.224
1.214.43.36 1.223.195.76 1.224.166.138 1.226.50.150
6.110.204.130 1.226.85.243 1.228.69.119 1.230.227.91
1.231.25.211 1.232.50.19 1.234.22.42 1.234.23.147