Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hangzhou

Region: Zhejiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.124.34.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.124.34.20.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:22:56 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 20.34.124.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.34.124.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.228.151.136 attack
Jun 28 09:47:43 web1 postfix/smtpd[10088]: warning: unknown[168.228.151.136]: SASL PLAIN authentication failed: authentication failure
...
2019-06-29 00:45:59
177.107.30.194 attackbotsspam
Brute force SMTP login attempts.
2019-06-29 01:14:43
177.154.238.184 attack
Jun 28 09:47:36 web1 postfix/smtpd[10088]: warning: unknown[177.154.238.184]: SASL PLAIN authentication failed: authentication failure
...
2019-06-29 00:53:36
184.105.139.70 attack
1561633716 - 06/27/2019 18:08:36 Host: scan-04.shadowserver.org/184.105.139.70 Port: 23 TCP Blocked
...
2019-06-29 00:57:15
114.40.169.206 attack
Honeypot attack, port: 23, PTR: 114-40-169-206.dynamic-ip.hinet.net.
2019-06-29 01:06:33
182.176.170.3 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 00:41:31
77.44.24.171 attack
Honeypot attack, port: 445, PTR: www0.wn1-it.net.
2019-06-29 00:40:58
188.165.0.128 attackbots
wp brute-force
2019-06-29 00:43:38
116.209.190.95 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-29 00:31:52
23.224.82.82 attackspambots
port 23 attempt blocked
2019-06-29 00:19:08
103.27.119.58 attack
1561608271 - 06/27/2019 11:04:31 Host: 103-27-119-58.frontiir.com/103.27.119.58 Port: 23 TCP Blocked
...
2019-06-29 01:10:50
120.240.92.35 attackspam
3389BruteforceStormFW21
2019-06-29 00:48:36
198.98.61.249 attackspam
Malicious Traffic/Form Submission
2019-06-29 00:31:21
46.101.204.20 attackspam
Jun 28 17:31:02 hosting sshd[26150]: Invalid user nas from 46.101.204.20 port 35056
...
2019-06-29 00:49:04
5.55.104.239 attack
Jun 28 15:48:21 server postfix/smtpd[11018]: NOQUEUE: reject: RCPT from ppp005055104239.access.hol.gr[5.55.104.239]: 554 5.7.1 Service unavailable; Client host [5.55.104.239] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/5.55.104.239; from= to= proto=ESMTP helo=
2019-06-29 00:14:48

Recently Reported IPs

112.124.50.7 112.124.253.90 112.124.245.82 112.125.144.221
112.124.29.209 112.124.243.118 112.124.234.205 112.124.242.94
112.124.225.189 112.124.22.101 112.124.224.22 112.124.227.55
112.124.205.237 112.124.215.129 112.124.202.9 112.124.197.35
112.124.207.218 112.124.192.49 112.124.219.216 112.124.181.192