Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pohang

Region: Gyeongsangbuk-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.202.53.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.202.53.212.			IN	A

;; AUTHORITY SECTION:
.			278	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023020902 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 10 13:06:29 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 212.53.202.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.53.202.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.14 attackbotsspam
Jun 26 23:24:53 debian sshd[25756]: Unable to negotiate with 222.186.190.14 port 58671: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
Jun 27 01:06:07 debian sshd[3953]: Unable to negotiate with 222.186.190.14 port 59297: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth]
...
2020-06-27 13:15:51
119.45.145.246 attack
Jun 27 06:45:01 PorscheCustomer sshd[1132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.145.246
Jun 27 06:45:04 PorscheCustomer sshd[1132]: Failed password for invalid user django from 119.45.145.246 port 44928 ssh2
Jun 27 06:46:52 PorscheCustomer sshd[1166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.145.246
...
2020-06-27 13:12:47
77.42.92.29 attackbotsspam
Automatic report - Port Scan Attack
2020-06-27 13:00:05
209.97.138.167 attackspambots
Jun 27 00:38:18 NPSTNNYC01T sshd[5840]: Failed password for root from 209.97.138.167 port 53546 ssh2
Jun 27 00:41:17 NPSTNNYC01T sshd[6065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.138.167
Jun 27 00:41:19 NPSTNNYC01T sshd[6065]: Failed password for invalid user gcl from 209.97.138.167 port 51634 ssh2
...
2020-06-27 12:49:55
193.228.91.11 attack
Invalid user oracle from 193.228.91.11 port 44550
2020-06-27 13:06:27
51.38.129.120 attackbots
5x Failed Password
2020-06-27 13:20:12
136.49.109.217 attackspambots
$f2bV_matches
2020-06-27 12:55:21
222.186.175.202 attackbotsspam
Jun 27 00:53:21 NPSTNNYC01T sshd[6978]: Failed password for root from 222.186.175.202 port 11028 ssh2
Jun 27 00:53:25 NPSTNNYC01T sshd[6978]: Failed password for root from 222.186.175.202 port 11028 ssh2
Jun 27 00:53:28 NPSTNNYC01T sshd[6978]: Failed password for root from 222.186.175.202 port 11028 ssh2
Jun 27 00:53:31 NPSTNNYC01T sshd[6978]: Failed password for root from 222.186.175.202 port 11028 ssh2
...
2020-06-27 13:16:13
222.186.15.62 attackspam
2020-06-27T06:55:35.163018vps751288.ovh.net sshd\[25638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-06-27T06:55:37.482681vps751288.ovh.net sshd\[25638\]: Failed password for root from 222.186.15.62 port 40602 ssh2
2020-06-27T06:55:39.997433vps751288.ovh.net sshd\[25638\]: Failed password for root from 222.186.15.62 port 40602 ssh2
2020-06-27T06:55:42.254496vps751288.ovh.net sshd\[25638\]: Failed password for root from 222.186.15.62 port 40602 ssh2
2020-06-27T06:55:46.225270vps751288.ovh.net sshd\[25646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-06-27 13:23:06
43.247.69.105 attackbotsspam
2020-06-27T05:54:46.427180vps773228.ovh.net sshd[1415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.69.105
2020-06-27T05:54:46.409957vps773228.ovh.net sshd[1415]: Invalid user smb from 43.247.69.105 port 43488
2020-06-27T05:54:48.471023vps773228.ovh.net sshd[1415]: Failed password for invalid user smb from 43.247.69.105 port 43488 ssh2
2020-06-27T05:55:55.291368vps773228.ovh.net sshd[1419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.69.105  user=root
2020-06-27T05:55:56.808165vps773228.ovh.net sshd[1419]: Failed password for root from 43.247.69.105 port 59682 ssh2
...
2020-06-27 13:04:02
142.93.162.84 attackbotsspam
2020-06-27T08:01:06.138154afi-git.jinr.ru sshd[22071]: Invalid user cloud from 142.93.162.84 port 54710
2020-06-27T08:01:06.141398afi-git.jinr.ru sshd[22071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.162.84
2020-06-27T08:01:06.138154afi-git.jinr.ru sshd[22071]: Invalid user cloud from 142.93.162.84 port 54710
2020-06-27T08:01:08.234922afi-git.jinr.ru sshd[22071]: Failed password for invalid user cloud from 142.93.162.84 port 54710 ssh2
2020-06-27T08:04:16.572822afi-git.jinr.ru sshd[22681]: Invalid user orca from 142.93.162.84 port 55514
...
2020-06-27 13:04:58
94.143.241.21 attack
Icarus honeypot on github
2020-06-27 13:11:12
152.32.146.218 attack
2020-06-27T03:52:43.564734abusebot-2.cloudsearch.cf sshd[19853]: Invalid user ubuntu from 152.32.146.218 port 44310
2020-06-27T03:52:43.572030abusebot-2.cloudsearch.cf sshd[19853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.146.218
2020-06-27T03:52:43.564734abusebot-2.cloudsearch.cf sshd[19853]: Invalid user ubuntu from 152.32.146.218 port 44310
2020-06-27T03:52:45.731115abusebot-2.cloudsearch.cf sshd[19853]: Failed password for invalid user ubuntu from 152.32.146.218 port 44310 ssh2
2020-06-27T03:56:10.945044abusebot-2.cloudsearch.cf sshd[19858]: Invalid user file from 152.32.146.218 port 51982
2020-06-27T03:56:10.952206abusebot-2.cloudsearch.cf sshd[19858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.146.218
2020-06-27T03:56:10.945044abusebot-2.cloudsearch.cf sshd[19858]: Invalid user file from 152.32.146.218 port 51982
2020-06-27T03:56:12.860442abusebot-2.cloudsearch.cf sshd[19858]
...
2020-06-27 12:43:51
101.89.145.133 attackbotsspam
2020-06-27T06:13:17.001563vps773228.ovh.net sshd[1598]: Invalid user steam from 101.89.145.133 port 48746
2020-06-27T06:13:17.018861vps773228.ovh.net sshd[1598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.145.133
2020-06-27T06:13:17.001563vps773228.ovh.net sshd[1598]: Invalid user steam from 101.89.145.133 port 48746
2020-06-27T06:13:18.916993vps773228.ovh.net sshd[1598]: Failed password for invalid user steam from 101.89.145.133 port 48746 ssh2
2020-06-27T06:16:36.181880vps773228.ovh.net sshd[1642]: Invalid user git from 101.89.145.133 port 40526
...
2020-06-27 12:58:29
49.232.162.77 attack
$f2bV_matches
2020-06-27 12:49:26

Recently Reported IPs

242.253.142.85 115.100.39.193 151.169.213.166 209.212.42.180
26.56.143.213 31.153.180.170 239.40.128.94 77.201.179.218
139.114.190.222 203.24.166.183 45.136.155.5 164.205.46.255
78.188.143.157 219.120.57.53 243.231.231.216 51.12.209.177
208.199.152.208 94.199.222.44 134.209.93.78 115.85.233.185