Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osan

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.42.124.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.42.124.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 12:30:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 131.124.42.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.124.42.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.207.182.133 attackbotsspam
Nov  6 08:19:13 ArkNodeAT sshd\[9700\]: Invalid user joomla from 41.207.182.133
Nov  6 08:19:13 ArkNodeAT sshd\[9700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.182.133
Nov  6 08:19:15 ArkNodeAT sshd\[9700\]: Failed password for invalid user joomla from 41.207.182.133 port 51492 ssh2
2019-11-06 16:07:45
123.206.174.26 attack
Nov  6 07:15:28 hcbbdb sshd\[18225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.26  user=root
Nov  6 07:15:30 hcbbdb sshd\[18225\]: Failed password for root from 123.206.174.26 port 59252 ssh2
Nov  6 07:20:19 hcbbdb sshd\[18757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.26  user=root
Nov  6 07:20:21 hcbbdb sshd\[18757\]: Failed password for root from 123.206.174.26 port 41048 ssh2
Nov  6 07:25:04 hcbbdb sshd\[19237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.26  user=root
2019-11-06 15:28:15
54.39.147.2 attack
Nov  6 07:47:01 web8 sshd\[12533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.147.2  user=root
Nov  6 07:47:03 web8 sshd\[12533\]: Failed password for root from 54.39.147.2 port 40379 ssh2
Nov  6 07:51:19 web8 sshd\[14582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.147.2  user=root
Nov  6 07:51:21 web8 sshd\[14582\]: Failed password for root from 54.39.147.2 port 59238 ssh2
Nov  6 07:55:38 web8 sshd\[16612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.147.2  user=root
2019-11-06 16:05:53
103.47.82.221 attackspam
Nov  6 08:53:25 legacy sshd[21087]: Failed password for root from 103.47.82.221 port 53556 ssh2
Nov  6 08:57:37 legacy sshd[21252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.82.221
Nov  6 08:57:38 legacy sshd[21252]: Failed password for invalid user lorenzo from 103.47.82.221 port 55036 ssh2
...
2019-11-06 15:58:12
195.3.145.58 attackspambots
Lines containing failures of 195.3.145.58 (max 1000)
Nov  6 06:20:07 localhost sshd[903]: Invalid user test from 195.3.145.58 port 43245
Nov  6 06:20:07 localhost sshd[903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.145.58 
Nov  6 06:20:09 localhost sshd[903]: Failed password for invalid user test from 195.3.145.58 port 43245 ssh2
Nov  6 06:20:10 localhost sshd[903]: Received disconnect from 195.3.145.58 port 43245:11: Bye Bye [preauth]
Nov  6 06:20:10 localhost sshd[903]: Disconnected from invalid user test 195.3.145.58 port 43245 [preauth]
Nov  6 06:31:19 localhost sshd[7734]: Invalid user invoices from 195.3.145.58 port 56923
Nov  6 06:31:19 localhost sshd[7734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.145.58 
Nov  6 06:31:21 localhost sshd[7734]: Failed password for invalid user invoices from 195.3.145.58 port 56923 ssh2
Nov  6 06:31:22 localhost sshd[7734]: Rece........
------------------------------
2019-11-06 15:34:47
178.71.205.46 attackbots
Chat Spam
2019-11-06 15:38:28
188.166.246.46 attack
Nov  6 07:19:40 vps58358 sshd\[11495\]: Invalid user 123456 from 188.166.246.46Nov  6 07:19:41 vps58358 sshd\[11495\]: Failed password for invalid user 123456 from 188.166.246.46 port 38464 ssh2Nov  6 07:24:05 vps58358 sshd\[11528\]: Invalid user tie123 from 188.166.246.46Nov  6 07:24:07 vps58358 sshd\[11528\]: Failed password for invalid user tie123 from 188.166.246.46 port 49016 ssh2Nov  6 07:28:29 vps58358 sshd\[11567\]: Invalid user aktuna from 188.166.246.46Nov  6 07:28:31 vps58358 sshd\[11567\]: Failed password for invalid user aktuna from 188.166.246.46 port 59570 ssh2
...
2019-11-06 16:06:48
107.170.235.19 attackbots
Nov  6 08:40:26 legacy sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.235.19
Nov  6 08:40:28 legacy sshd[20684]: Failed password for invalid user murp from 107.170.235.19 port 51682 ssh2
Nov  6 08:44:20 legacy sshd[20811]: Failed password for root from 107.170.235.19 port 33710 ssh2
...
2019-11-06 15:53:08
52.209.240.244 attackspam
Automatic report - XMLRPC Attack
2019-11-06 15:42:35
206.189.62.194 attack
port scan and connect, tcp 8080 (http-proxy)
2019-11-06 15:40:21
106.13.109.19 attackspambots
Nov  6 12:32:45 gw1 sshd[22400]: Failed password for root from 106.13.109.19 port 44068 ssh2
...
2019-11-06 15:44:14
144.202.39.161 attackspam
eintrachtkultkellerfulda.de 144.202.39.161 \[06/Nov/2019:07:41:02 +0100\] "POST /wp-login.php HTTP/1.1" 200 2068 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
eintrachtkultkellerfulda.de 144.202.39.161 \[06/Nov/2019:07:41:03 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-06 15:46:21
120.224.101.134 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-06 15:51:06
222.186.175.154 attackbots
Nov  6 08:54:47 MK-Soft-Root2 sshd[9456]: Failed password for root from 222.186.175.154 port 24046 ssh2
Nov  6 08:54:53 MK-Soft-Root2 sshd[9456]: Failed password for root from 222.186.175.154 port 24046 ssh2
...
2019-11-06 15:56:57
92.17.228.88 attack
Automatic report - Port Scan Attack
2019-11-06 15:31:24

Recently Reported IPs

9.238.144.110 135.120.166.1 232.78.230.14 76.206.40.48
196.190.52.189 93.70.70.187 46.245.65.0 126.220.115.154
194.41.47.77 225.13.179.135 140.45.66.184 236.202.84.76
136.84.114.20 103.97.255.217 198.7.29.87 255.47.57.14
59.249.111.81 64.89.77.141 72.234.101.121 185.6.85.8