Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daegu

Region: Daegu

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.55.80.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.55.80.37.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100100 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 01 22:17:43 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 37.80.55.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 37.80.55.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.204.154 attackspambots
Aug 17 14:37:30 web8 sshd\[32626\]: Invalid user lian from 54.37.204.154
Aug 17 14:37:30 web8 sshd\[32626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154
Aug 17 14:37:31 web8 sshd\[32626\]: Failed password for invalid user lian from 54.37.204.154 port 56472 ssh2
Aug 17 14:41:45 web8 sshd\[2669\]: Invalid user francisco from 54.37.204.154
Aug 17 14:41:45 web8 sshd\[2669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154
2019-08-18 00:09:37
173.245.239.196 attack
IMAP brute force
...
2019-08-18 00:39:22
45.55.182.232 attackbots
Aug 17 18:38:14 eventyay sshd[2241]: Failed password for root from 45.55.182.232 port 35076 ssh2
Aug 17 18:42:34 eventyay sshd[3287]: Failed password for root from 45.55.182.232 port 53908 ssh2
Aug 17 18:46:54 eventyay sshd[4335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.182.232
...
2019-08-18 00:55:03
51.158.74.14 attackspam
Aug 17 03:06:54 php1 sshd\[31542\]: Invalid user minecraftserver from 51.158.74.14
Aug 17 03:06:54 php1 sshd\[31542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
Aug 17 03:06:55 php1 sshd\[31542\]: Failed password for invalid user minecraftserver from 51.158.74.14 port 41090 ssh2
Aug 17 03:11:07 php1 sshd\[32019\]: Invalid user ts3 from 51.158.74.14
Aug 17 03:11:07 php1 sshd\[32019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.74.14
2019-08-18 00:37:53
216.218.206.71 attackspambots
firewall-block, port(s): 9200/tcp
2019-08-18 00:31:21
173.212.209.142 attackspambots
Aug 17 17:19:41 pkdns2 sshd\[10372\]: Invalid user travis from 173.212.209.142Aug 17 17:19:43 pkdns2 sshd\[10372\]: Failed password for invalid user travis from 173.212.209.142 port 37654 ssh2Aug 17 17:24:26 pkdns2 sshd\[10577\]: Invalid user prueba from 173.212.209.142Aug 17 17:24:28 pkdns2 sshd\[10577\]: Failed password for invalid user prueba from 173.212.209.142 port 56966 ssh2Aug 17 17:29:13 pkdns2 sshd\[10797\]: Invalid user lancelot from 173.212.209.142Aug 17 17:29:15 pkdns2 sshd\[10797\]: Failed password for invalid user lancelot from 173.212.209.142 port 48060 ssh2
...
2019-08-18 00:15:34
159.65.175.37 attackspam
2019-08-17T16:17:21.392617abusebot-7.cloudsearch.cf sshd\[2283\]: Invalid user test from 159.65.175.37 port 13974
2019-08-18 00:19:35
47.180.63.37 attackbotsspam
proto=tcp  .  spt=39710  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (267)
2019-08-18 00:54:30
188.166.101.236 attackspam
SpamReport
2019-08-18 00:42:30
210.20.84.241 attack
" "
2019-08-18 00:26:53
62.210.182.82 attackspambots
www.handydirektreparatur.de 62.210.182.82 \[17/Aug/2019:11:34:05 +0200\] "POST /wp-login.php HTTP/1.1" 200 5665 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\; rv:61.0.1\) Gecko/20120101 Firefox/61.0.1"
www.handydirektreparatur.de 62.210.182.82 \[17/Aug/2019:11:34:05 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4114 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\; rv:61.0.1\) Gecko/20120101 Firefox/61.0.1"
2019-08-18 00:02:18
118.98.121.195 attackbotsspam
Aug 17 03:52:12 eddieflores sshd\[3931\]: Invalid user pinguin from 118.98.121.195
Aug 17 03:52:12 eddieflores sshd\[3931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
Aug 17 03:52:14 eddieflores sshd\[3931\]: Failed password for invalid user pinguin from 118.98.121.195 port 34218 ssh2
Aug 17 03:57:27 eddieflores sshd\[4373\]: Invalid user hamlet from 118.98.121.195
Aug 17 03:57:27 eddieflores sshd\[4373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195
2019-08-18 00:43:38
103.120.227.49 attack
Aug 17 08:35:50 aat-srv002 sshd[17070]: Failed password for root from 103.120.227.49 port 37778 ssh2
Aug 17 08:41:18 aat-srv002 sshd[17271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.227.49
Aug 17 08:41:20 aat-srv002 sshd[17271]: Failed password for invalid user adolph from 103.120.227.49 port 33236 ssh2
...
2019-08-17 23:56:55
45.63.59.111 attack
Aug 17 12:35:58 localhost sshd\[11716\]: Invalid user user3 from 45.63.59.111 port 47076
Aug 17 12:35:58 localhost sshd\[11716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.63.59.111
Aug 17 12:36:00 localhost sshd\[11716\]: Failed password for invalid user user3 from 45.63.59.111 port 47076 ssh2
2019-08-18 00:20:12
187.178.238.177 attackbots
NAME : "" "" CIDR :  | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack  - block certain countries :) IP: 187.178.238.177  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-18 00:13:51

Recently Reported IPs

157.178.230.86 111.37.235.191 18.104.54.197 70.223.104.21
148.135.7.251 42.229.170.15 86.52.225.86 47.162.232.33
78.42.254.170 104.46.42.104 196.8.202.14 188.89.74.104
213.113.132.5 52.193.63.23 67.244.204.101 70.254.244.169
138.160.11.115 124.186.250.212 152.150.202.125 204.171.195.22