Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: LG DACOM Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.80.134.84 attackspambots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08050931)
2019-08-05 21:14:19
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.80.134.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58836
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.80.134.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 20 01:38:13 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 82.134.80.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 82.134.80.103.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
162.243.130.16 attackspam
Port scan(s) denied
2020-04-24 07:55:36
202.134.0.9 attackspam
Multiport scan : 5 ports scanned 1604 2834 5472 18950 26265
2020-04-24 08:07:40
52.189.238.245 attackspam
RDP Bruteforce
2020-04-24 08:04:31
162.243.128.186 attack
520/tcp 9990/tcp 2078/tcp...
[2020-03-16/04-22]36pkt,26pt.(tcp),3pt.(udp)
2020-04-24 08:00:15
162.243.130.25 attack
Port scan(s) denied
2020-04-24 07:49:59
200.187.165.218 attackspam
Automatic report - Port Scan Attack
2020-04-24 07:58:23
180.168.141.246 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-04-24 08:01:41
189.4.2.58 attack
Invalid user p from 189.4.2.58 port 59442
2020-04-24 07:47:35
92.222.141.74 attack
1587664593 - 04/23/2020 19:56:33 Host: 92.222.141.74/92.222.141.74 Port: 31337 TCP Blocked
2020-04-24 07:44:14
210.177.223.252 attack
Scanned 3 times in the last 24 hours on port 22
2020-04-24 08:05:18
199.231.188.231 attack
DATE:2020-04-23 18:38:57, IP:199.231.188.231, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-04-24 07:33:37
139.59.32.51 attackbots
Port scan(s) denied
2020-04-24 07:31:29
138.204.122.220 attack
Apr 23 16:38:30 *** sshd[19763]: User root from 138.204.122.220 not allowed because not listed in AllowUsers
2020-04-24 08:02:04
206.189.182.217 attackspam
Port scan(s) denied
2020-04-24 07:37:15
162.243.129.21 attackbots
nft/Honeypot/11143/38cdf
2020-04-24 07:50:27

Recently Reported IPs

128.0.120.112 217.144.175.98 34.80.235.90 172.93.205.232
218.250.69.232 95.153.124.89 101.89.90.49 140.213.26.95
78.84.17.42 1.240.88.85 185.153.196.194 184.105.247.227
58.152.173.105 170.239.84.215 218.236.64.245 200.29.242.15
187.163.68.37 218.2.44.42 108.46.160.109 104.248.147.248