Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.12.70.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.12.70.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 10:39:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
50.70.12.124.in-addr.arpa domain name pointer 124-12-70-50.dynamic.tfn.net.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.70.12.124.in-addr.arpa	name = 124-12-70-50.dynamic.tfn.net.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.255.100.236 attackbotsspam
frenzy
2020-09-08 22:15:46
122.152.208.242 attack
Jul 31 21:22:07 server sshd[19815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.208.242  user=root
Jul 31 21:22:09 server sshd[19815]: Failed password for invalid user root from 122.152.208.242 port 57220 ssh2
Aug  1 00:54:31 server sshd[31535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.208.242  user=root
Aug  1 00:54:33 server sshd[31535]: Failed password for invalid user root from 122.152.208.242 port 33528 ssh2
2020-09-08 22:26:34
45.142.120.20 attackspambots
Sep  8 16:15:56 srv01 postfix/smtpd\[21573\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 16:16:09 srv01 postfix/smtpd\[29277\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 16:16:14 srv01 postfix/smtpd\[15724\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 16:16:22 srv01 postfix/smtpd\[29347\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  8 16:16:36 srv01 postfix/smtpd\[29277\]: warning: unknown\[45.142.120.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-08 22:20:18
147.135.133.88 attack
Sep  8 13:48:28 inter-technics sshd[10990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.88  user=root
Sep  8 13:48:30 inter-technics sshd[10990]: Failed password for root from 147.135.133.88 port 50236 ssh2
Sep  8 13:51:59 inter-technics sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.88  user=root
Sep  8 13:52:01 inter-technics sshd[11249]: Failed password for root from 147.135.133.88 port 52724 ssh2
Sep  8 13:55:23 inter-technics sshd[11519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.88  user=root
Sep  8 13:55:25 inter-technics sshd[11519]: Failed password for root from 147.135.133.88 port 55211 ssh2
...
2020-09-08 22:31:37
190.195.41.162 attackspambots
2020-09-07 18:52:23 1kFKNS-0000Pd-Lx SMTP connection from \(162-41-195-190.cab.prima.net.ar\) \[190.195.41.162\]:45702 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:52:35 1kFKNd-0000Pk-56 SMTP connection from \(162-41-195-190.cab.prima.net.ar\) \[190.195.41.162\]:45771 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-09-07 18:52:41 1kFKNj-0000Q0-Q8 SMTP connection from \(162-41-195-190.cab.prima.net.ar\) \[190.195.41.162\]:45810 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-09-08 22:36:38
112.85.42.173 attack
Sep  8 07:26:14 dignus sshd[22075]: Failed password for root from 112.85.42.173 port 47614 ssh2
Sep  8 07:26:16 dignus sshd[22075]: Failed password for root from 112.85.42.173 port 47614 ssh2
Sep  8 07:26:16 dignus sshd[22075]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 47614 ssh2 [preauth]
Sep  8 07:26:21 dignus sshd[22092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Sep  8 07:26:23 dignus sshd[22092]: Failed password for root from 112.85.42.173 port 12968 ssh2
...
2020-09-08 22:34:57
118.70.170.120 attack
Sep  8 16:24:37 buvik sshd[9369]: Invalid user rocco from 118.70.170.120
Sep  8 16:24:37 buvik sshd[9369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.170.120
Sep  8 16:24:40 buvik sshd[9369]: Failed password for invalid user rocco from 118.70.170.120 port 36518 ssh2
...
2020-09-08 22:34:13
140.143.244.91 attackbotsspam
Sep  8 11:20:28 rancher-0 sshd[1495338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.244.91  user=root
Sep  8 11:20:30 rancher-0 sshd[1495338]: Failed password for root from 140.143.244.91 port 34954 ssh2
...
2020-09-08 22:18:28
80.114.130.156 attack
DATE:2020-09-08 05:22:20, IP:80.114.130.156, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-09-08 22:37:30
106.12.207.236 attackbots
Aug  5 20:42:35 server sshd[9315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.236  user=root
Aug  5 20:42:37 server sshd[9315]: Failed password for invalid user root from 106.12.207.236 port 36762 ssh2
Aug  5 20:48:19 server sshd[9558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.236  user=root
Aug  5 20:48:21 server sshd[9558]: Failed password for invalid user root from 106.12.207.236 port 55828 ssh2
2020-09-08 22:07:32
61.64.54.207 attackspambots
Unauthorized connection attempt
2020-09-08 22:22:50
213.230.110.107 attack
Sep  7 16:52:46 rush sshd[741]: Failed password for root from 213.230.110.107 port 44286 ssh2
Sep  7 16:52:57 rush sshd[741]: error: maximum authentication attempts exceeded for root from 213.230.110.107 port 44286 ssh2 [preauth]
Sep  7 16:53:01 rush sshd[743]: Failed password for root from 213.230.110.107 port 45322 ssh2
...
2020-09-08 22:25:50
180.127.93.84 attackspambots
Email rejected due to spam filtering
2020-09-08 22:16:46
218.77.62.20 attack
Sep  7 18:45:05 dev0-dcde-rnet sshd[30149]: Failed password for root from 218.77.62.20 port 45090 ssh2
Sep  7 18:51:13 dev0-dcde-rnet sshd[30258]: Failed password for root from 218.77.62.20 port 40912 ssh2
2020-09-08 22:09:24
218.92.0.208 attackbots
Sep  8 13:10:43 eventyay sshd[26690]: Failed password for root from 218.92.0.208 port 37899 ssh2
Sep  8 13:12:09 eventyay sshd[26703]: Failed password for root from 218.92.0.208 port 40793 ssh2
Sep  8 13:12:11 eventyay sshd[26703]: Failed password for root from 218.92.0.208 port 40793 ssh2
...
2020-09-08 22:12:31

Recently Reported IPs

174.45.247.30 196.154.141.239 188.162.107.101 255.13.31.184
186.63.37.182 37.31.32.246 68.200.93.37 95.243.52.75
18.211.255.139 44.62.112.216 184.232.0.41 156.58.160.141
166.247.200.210 239.68.117.186 181.101.22.100 213.67.8.211
221.75.37.222 190.186.240.215 33.230.107.130 57.171.162.155