Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taichung

Region: Taichung City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.241.72.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.241.72.124.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 10:00:59 CST 2022
;; MSG SIZE  rcvd: 107
Host info
124.72.241.116.in-addr.arpa domain name pointer 116-241-72-124.cctv.dynamic.tbcnet.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.72.241.116.in-addr.arpa	name = 116-241-72-124.cctv.dynamic.tbcnet.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.45.22.89 attack
Aug 12 14:20:26 mxgate1 postfix/postscreen[26944]: CONNECT from [129.45.22.89]:63652 to [176.31.12.44]:25
Aug 12 14:20:26 mxgate1 postfix/dnsblog[27112]: addr 129.45.22.89 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 12 14:20:26 mxgate1 postfix/dnsblog[27112]: addr 129.45.22.89 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 12 14:20:26 mxgate1 postfix/dnsblog[27113]: addr 129.45.22.89 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 12 14:20:26 mxgate1 postfix/dnsblog[27116]: addr 129.45.22.89 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 12 14:20:32 mxgate1 postfix/postscreen[26944]: DNSBL rank 4 for [129.45.22.89]:63652
Aug x@x
Aug 12 14:20:32 mxgate1 postfix/postscreen[26944]: HANGUP after 0.27 from [129.45.22.89]:63652 in tests after SMTP handshake
Aug 12 14:20:32 mxgate1 postfix/postscreen[26944]: DISCONNECT [129.45.22.89]:63652


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=129.45.22.89
2019-08-12 23:27:05
51.75.142.41 attackspambots
Aug 12 11:50:41 TORMINT sshd\[11808\]: Invalid user centos from 51.75.142.41
Aug 12 11:50:41 TORMINT sshd\[11808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.142.41
Aug 12 11:50:43 TORMINT sshd\[11808\]: Failed password for invalid user centos from 51.75.142.41 port 58892 ssh2
...
2019-08-12 23:57:08
71.6.135.131 attack
12.08.2019 14:54:20 HTTP access blocked by firewall
2019-08-12 23:09:11
112.169.255.1 attackspambots
Aug 12 13:22:17 debian sshd\[5464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.255.1  user=root
Aug 12 13:22:18 debian sshd\[5464\]: Failed password for root from 112.169.255.1 port 49232 ssh2
...
2019-08-12 23:31:09
128.199.162.2 attackspambots
Aug 12 17:34:41 localhost sshd\[7894\]: Invalid user mansour from 128.199.162.2
Aug 12 17:34:41 localhost sshd\[7894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2
Aug 12 17:34:43 localhost sshd\[7894\]: Failed password for invalid user mansour from 128.199.162.2 port 58510 ssh2
Aug 12 17:39:33 localhost sshd\[8440\]: Invalid user administrator from 128.199.162.2
Aug 12 17:39:33 localhost sshd\[8440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2
...
2019-08-12 23:42:49
117.223.124.209 attackbots
Automatic report - Port Scan Attack
2019-08-12 23:46:01
94.177.214.200 attack
Aug 12 14:16:42 debian sshd\[6449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200  user=root
Aug 12 14:16:44 debian sshd\[6449\]: Failed password for root from 94.177.214.200 port 58814 ssh2
...
2019-08-12 22:54:33
149.56.132.202 attack
Aug 12 16:30:57 SilenceServices sshd[18852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
Aug 12 16:30:59 SilenceServices sshd[18852]: Failed password for invalid user psybnc123 from 149.56.132.202 port 35728 ssh2
Aug 12 16:35:26 SilenceServices sshd[22031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
2019-08-12 23:21:55
115.92.36.11 attack
Aug 12 15:00:20 arianus sshd\[18070\]: Invalid user admin from 115.92.36.11 port 37894
...
2019-08-12 23:49:50
81.22.45.85 attack
TCP 3389 (RDP)
2019-08-12 23:06:54
106.12.208.211 attackspam
Aug 12 13:27:37 vtv3 sshd\[12315\]: Invalid user ubuntu from 106.12.208.211 port 45244
Aug 12 13:27:37 vtv3 sshd\[12315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
Aug 12 13:27:38 vtv3 sshd\[12315\]: Failed password for invalid user ubuntu from 106.12.208.211 port 45244 ssh2
Aug 12 13:32:58 vtv3 sshd\[15139\]: Invalid user dujoey from 106.12.208.211 port 35780
Aug 12 13:32:58 vtv3 sshd\[15139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
Aug 12 13:43:21 vtv3 sshd\[20484\]: Invalid user user from 106.12.208.211 port 45072
Aug 12 13:43:21 vtv3 sshd\[20484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.211
Aug 12 13:43:23 vtv3 sshd\[20484\]: Failed password for invalid user user from 106.12.208.211 port 45072 ssh2
Aug 12 13:48:41 vtv3 sshd\[22909\]: Invalid user admin from 106.12.208.211 port 35590
Aug 12 13:48:41 vtv3 sshd\[2290
2019-08-12 22:59:58
197.247.56.14 attackspam
Aug 12 14:11:19 pl3server sshd[683781]: Invalid user test001 from 197.247.56.14
Aug 12 14:11:19 pl3server sshd[683781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.247.56.14
Aug 12 14:11:21 pl3server sshd[683781]: Failed password for invalid user test001 from 197.247.56.14 port 39592 ssh2
Aug 12 14:11:21 pl3server sshd[683781]: Received disconnect from 197.247.56.14: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.247.56.14
2019-08-12 23:34:40
118.34.12.35 attack
Aug 12 14:41:59 localhost sshd\[117029\]: Invalid user weldon123 from 118.34.12.35 port 36622
Aug 12 14:41:59 localhost sshd\[117029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
Aug 12 14:42:01 localhost sshd\[117029\]: Failed password for invalid user weldon123 from 118.34.12.35 port 36622 ssh2
Aug 12 14:46:56 localhost sshd\[117133\]: Invalid user password from 118.34.12.35 port 55904
Aug 12 14:46:56 localhost sshd\[117133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35
...
2019-08-12 23:03:19
94.38.238.174 attack
Automatic report - Port Scan Attack
2019-08-12 23:33:55
210.51.161.210 attackbotsspam
Automatic report - Banned IP Access
2019-08-12 23:46:42

Recently Reported IPs

169.229.188.55 180.76.44.104 115.73.129.99 116.108.58.142
180.76.104.249 169.229.190.162 169.229.192.45 150.95.113.168
180.76.69.173 106.11.152.98 106.11.156.175 113.121.113.199
114.33.111.172 252.154.191.234 252.154.191.151 169.229.166.47
169.229.146.111 114.231.8.238 119.126.157.56 169.229.169.55