Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '112.72.16.0 - 112.72.31.255'

% No abuse contact registered for 112.72.16.0 - 112.72.31.255

inetnum:        112.72.16.0 - 112.72.31.255
netname:        JCNETWORK
descr:          jungwoocomnet
descr:          1056-11, KYONGGI Gwonseon-dong Gwonseon-gu, Suwon-si Gyeonggi-do
descr:          ***********************************
descr:          Allocated to KRNIC Member.
descr:          If you would like to find assignment
descr:          information in detail please refer to
descr:          the KRNIC Whois Database at:
descr:          "http://whois.nida.or.kr/english/index.html"
descr:          ************************************
country:        KR
admin-c:        BJ235-AP
tech-c:         BJ235-AP
status:         Allocated Portable
remarks:        www.jungwoocom.net
mnt-by:         MNT-KRNIC-AP
mnt-lower:      MNT-KRNIC-AP
last-modified:  2008-12-24T01:20:06Z
source:         APNIC

person:         Boungwoo Jung
nic-hdl:        BJ235-AP
e-mail:         comnetjw@hanmir.com
address:        1056-11, KYONGGI Gwonseon-dong Gwonseon-gu, Suwon-si Gyeonggi-do, 441-824
phone:          +82-31-221-7722
fax-no:         +82-31-221-7742
country:        KR
mnt-by:         MNT-KRNIC-AP
last-modified:  2008-09-04T07:50:09Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.72.31.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.72.31.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 10:43:08 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 80.31.72.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.31.72.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.188.52.48 attackbotsspam
20/4/12@23:55:41: FAIL: Alarm-Network address from=14.188.52.48
...
2020-04-13 15:15:50
96.84.240.89 attackbots
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-13 15:37:44
129.211.70.33 attackbotsspam
Apr 13 08:07:36 server sshd[63032]: Failed password for invalid user vps from 129.211.70.33 port 55462 ssh2
Apr 13 08:11:16 server sshd[63953]: Failed password for invalid user radio from 129.211.70.33 port 47023 ssh2
Apr 13 08:14:53 server sshd[64878]: Failed password for root from 129.211.70.33 port 38583 ssh2
2020-04-13 15:19:13
172.105.28.38 attackspam
trying to access non-authorized port
2020-04-13 15:12:04
3.84.115.189 attackbots
5x Failed Password
2020-04-13 15:41:09
183.88.217.46 attackspambots
Dovecot Invalid User Login Attempt.
2020-04-13 15:19:39
36.22.187.34 attack
Unauthorized SSH login attempts
2020-04-13 15:32:03
122.51.215.154 attack
Apr 13 08:01:51 host01 sshd[23764]: Failed password for root from 122.51.215.154 port 44126 ssh2
Apr 13 08:06:12 host01 sshd[24552]: Failed password for root from 122.51.215.154 port 47248 ssh2
...
2020-04-13 15:25:20
182.148.179.253 attack
Apr 13 05:47:23 srv01 sshd[14433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253  user=root
Apr 13 05:47:25 srv01 sshd[14433]: Failed password for root from 182.148.179.253 port 42706 ssh2
Apr 13 05:54:12 srv01 sshd[14757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253  user=root
Apr 13 05:54:14 srv01 sshd[14757]: Failed password for root from 182.148.179.253 port 53100 ssh2
Apr 13 05:55:10 srv01 sshd[14802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.148.179.253  user=root
Apr 13 05:55:11 srv01 sshd[14802]: Failed password for root from 182.148.179.253 port 36576 ssh2
...
2020-04-13 15:35:48
118.89.153.96 attackbotsspam
Apr 13 07:56:51 host01 sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.153.96 
Apr 13 07:56:53 host01 sshd[22807]: Failed password for invalid user rpc from 118.89.153.96 port 32900 ssh2
Apr 13 08:01:40 host01 sshd[23705]: Failed password for root from 118.89.153.96 port 55130 ssh2
...
2020-04-13 15:03:49
80.211.114.30 attack
Wordpress malicious attack:[sshd]
2020-04-13 15:04:53
222.186.175.23 attackbotsspam
Apr 13 04:25:49 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2
Apr 13 04:25:54 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2
Apr 13 04:25:56 firewall sshd[17974]: Failed password for root from 222.186.175.23 port 34395 ssh2
...
2020-04-13 15:31:21
128.199.220.232 attack
$f2bV_matches
2020-04-13 15:27:34
81.246.63.226 attack
$f2bV_matches
2020-04-13 15:04:32
212.81.57.120 attack
SpamScore above: 10.0
2020-04-13 15:04:18

Recently Reported IPs

27.223.135.162 100.99.100.205 194.46.122.149 194.194.103.235
202.154.37.22 46.224.161.11 103.47.82.85 2606:4700:10::6814:6151
121.230.89.153 2606:4700:10::6816:3620 2606:4700:10::6814:7127 2606:4700:10::6814:8081
2606:4700:10::6816:2898 2606:4700:10::6814:7096 2606:4700:10::6816:2932 2606:4700:10::ac43:1691
2606:4700:10::6816:4644 14.207.194.154 10.135.31.200 20.168.127.116