Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.104.122.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.104.122.5.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081500 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 17:36:50 CST 2024
;; MSG SIZE  rcvd: 106
Host info
5.122.104.112.in-addr.arpa domain name pointer 112-104-122-5.adsl.dynamic.seed.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.122.104.112.in-addr.arpa	name = 112-104-122-5.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.136.164 attackspam
404 NOT FOUND
2020-09-09 14:05:05
122.228.19.79 attackbotsspam
2020-09-08 22:13 Reject access to port(s):3310,25,465 4 times a day
2020-09-08 22:13 SMTP:3310,25,465 IP autobanned - 4 attempts  a day
2020-09-09 13:48:29
222.186.175.216 attackspam
Blocked by jail recidive
2020-09-09 13:46:01
222.186.173.201 attackbotsspam
Sep  9 08:29:30 ift sshd\[9789\]: Failed password for root from 222.186.173.201 port 29102 ssh2Sep  9 08:33:14 ift sshd\[10234\]: Failed password for root from 222.186.173.201 port 21848 ssh2Sep  9 08:33:17 ift sshd\[10234\]: Failed password for root from 222.186.173.201 port 21848 ssh2Sep  9 08:33:21 ift sshd\[10234\]: Failed password for root from 222.186.173.201 port 21848 ssh2Sep  9 08:33:35 ift sshd\[10240\]: Failed password for root from 222.186.173.201 port 1040 ssh2
...
2020-09-09 13:35:54
14.115.28.120 attack
SSH Brute Force
2020-09-09 14:04:49
139.219.0.102 attackbots
Sep  9 01:32:47 mail sshd\[63284\]: Invalid user shera from 139.219.0.102
...
2020-09-09 13:58:26
54.37.136.87 attackbotsspam
Sep  9 07:42:50 hosting sshd[30458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Sep  9 07:42:52 hosting sshd[30458]: Failed password for root from 54.37.136.87 port 42562 ssh2
...
2020-09-09 14:10:09
81.68.135.238 attack
(sshd) Failed SSH login from 81.68.135.238 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  8 18:15:43 idl1-dfw sshd[2471730]: Invalid user admin from 81.68.135.238 port 49184
Sep  8 18:15:45 idl1-dfw sshd[2471730]: Failed password for invalid user admin from 81.68.135.238 port 49184 ssh2
Sep  8 18:27:11 idl1-dfw sshd[2484721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.135.238  user=root
Sep  8 18:27:13 idl1-dfw sshd[2484721]: Failed password for root from 81.68.135.238 port 41100 ssh2
Sep  8 18:29:59 idl1-dfw sshd[2488304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.135.238  user=root
2020-09-09 13:47:58
189.45.198.214 attackspambots
failed_logins
2020-09-09 13:46:38
119.45.122.102 attackspambots
Sep  8 20:58:38 mout sshd[14740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.122.102  user=root
Sep  8 20:58:41 mout sshd[14740]: Failed password for root from 119.45.122.102 port 34666 ssh2
2020-09-09 13:52:10
92.55.237.224 attackbots
Brute force attempt
2020-09-09 13:58:43
49.235.217.169 attackspambots
$f2bV_matches
2020-09-09 13:42:53
121.201.107.32 attack
(smtpauth) Failed SMTP AUTH login from 121.201.107.32 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-09-08 19:26:37 dovecot_login authenticator failed for (bajamalibu.net) [121.201.107.32]:37270: 535 Incorrect authentication data (set_id=nologin)
2020-09-08 19:27:10 dovecot_login authenticator failed for (bajamalibu.net) [121.201.107.32]:39914: 535 Incorrect authentication data (set_id=mailer@bajamalibu.net)
2020-09-08 19:27:34 dovecot_login authenticator failed for (bajamalibu.net) [121.201.107.32]:41804: 535 Incorrect authentication data (set_id=mailer)
2020-09-08 19:37:10 dovecot_login authenticator failed for (motelvilladelis.com) [121.201.107.32]:60088: 535 Incorrect authentication data (set_id=nologin)
2020-09-08 19:37:39 dovecot_login authenticator failed for (motelvilladelis.com) [121.201.107.32]:34154: 535 Incorrect authentication data (set_id=mailer@motelvilladelis.com)
2020-09-09 14:01:43
45.142.120.61 attackspambots
Sep  9 00:45:52 marvibiene postfix/smtpd[2152]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Sep  9 01:49:15 marvibiene postfix/smtpd[5442]: warning: unknown[45.142.120.61]: SASL LOGIN authentication failed: VXNlcm5hbWU6
2020-09-09 14:08:58
144.172.93.124 attackbots
Spam
2020-09-09 13:44:46

Recently Reported IPs

112.104.128.148 112.104.120.90 112.104.115.28 112.104.113.134
112.104.127.60 112.104.102.201 112.104.131.35 112.103.76.186
112.103.93.130 112.104.180.218 112.103.52.136 112.103.55.134
112.103.98.169 112.103.34.205 112.103.74.255 112.103.91.122
112.103.38.141 112.103.50.142 112.103.254.156 112.103.216.201