Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung City

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.219.72.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.219.72.80.			IN	A

;; AUTHORITY SECTION:
.			291	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061001 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 11 08:05:29 CST 2020
;; MSG SIZE  rcvd: 117
Host info
80.72.219.124.in-addr.arpa domain name pointer 124-219-72-80.vdslpro.static.apol.com.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.72.219.124.in-addr.arpa	name = 124-219-72-80.vdslpro.static.apol.com.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
149.202.241.249 attack
Lines containing failures of 149.202.241.249
Jun 11 00:56:14 linuxrulz sshd[1206]: Did not receive identification string from 149.202.241.249 port 55866
Jun 11 00:56:19 linuxrulz sshd[1207]: Did not receive identification string from 149.202.241.249 port 40328
Jun 11 00:56:19 linuxrulz sshd[1208]: Did not receive identification string from 149.202.241.249 port 35478
Jun 11 01:05:51 linuxrulz sshd[2425]: Invalid user 178.128.55.184 - SSH-2.0-Ope.SSH_7.6p1 Ubuntu-4ubuntu0.3\r from 149.202.241.249 port 35344
Jun 11 01:05:51 linuxrulz sshd[2425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.241.249 
Jun 11 01:05:53 linuxrulz sshd[2425]: Failed password for invalid user 178.128.55.184 - SSH-2.0-Ope.SSH_7.6p1 Ubuntu-4ubuntu0.3\r from 149.202.241.249 port 35344 ssh2
Jun 11 01:05:54 linuxrulz sshd[2425]: Received disconnect from 149.202.241.249 port 35344:11: Normal Shutdown, Thank you for playing [preauth]
Jun 11 01:05:54 linux........
------------------------------
2020-06-12 21:52:51
192.144.141.127 attack
Lines containing failures of 192.144.141.127
Jun 10 22:35:18 mc sshd[9425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.141.127  user=r.r
Jun 10 22:35:20 mc sshd[9425]: Failed password for r.r from 192.144.141.127 port 39706 ssh2
Jun 10 22:35:21 mc sshd[9425]: Received disconnect from 192.144.141.127 port 39706:11: Bye Bye [preauth]
Jun 10 22:35:21 mc sshd[9425]: Disconnected from authenticating user r.r 192.144.141.127 port 39706 [preauth]
Jun 10 22:50:38 mc sshd[9735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.141.127  user=r.r
Jun 10 22:50:40 mc sshd[9735]: Failed password for r.r from 192.144.141.127 port 47364 ssh2
Jun 10 22:50:41 mc sshd[9735]: Received disconnect from 192.144.141.127 port 47364:11: Bye Bye [preauth]
Jun 10 22:50:41 mc sshd[9735]: Disconnected from authenticating user r.r 192.144.141.127 port 47364 [preauth]
Jun 10 22:55:30 mc sshd[9788]: Inval........
------------------------------
2020-06-12 21:30:57
46.38.145.250 attackbots
Jun 12 15:34:03 srv01 postfix/smtpd\[18398\]: warning: unknown\[46.38.145.250\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 15:34:07 srv01 postfix/smtpd\[18401\]: warning: unknown\[46.38.145.250\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 15:34:45 srv01 postfix/smtpd\[18401\]: warning: unknown\[46.38.145.250\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 15:35:15 srv01 postfix/smtpd\[18398\]: warning: unknown\[46.38.145.250\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 12 15:35:37 srv01 postfix/smtpd\[18398\]: warning: unknown\[46.38.145.250\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-12 21:37:11
103.1.209.245 attackspambots
Jun 12 14:39:24 buvik sshd[19970]: Failed password for invalid user kiran from 103.1.209.245 port 49364 ssh2
Jun 12 14:43:22 buvik sshd[20534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.209.245  user=root
Jun 12 14:43:25 buvik sshd[20534]: Failed password for root from 103.1.209.245 port 46292 ssh2
...
2020-06-12 21:38:49
155.230.28.207 attack
2020-06-12T13:11:30.142681shield sshd\[14060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.230.28.207  user=root
2020-06-12T13:11:32.079856shield sshd\[14060\]: Failed password for root from 155.230.28.207 port 59552 ssh2
2020-06-12T13:13:33.477661shield sshd\[14561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.230.28.207  user=root
2020-06-12T13:13:35.966985shield sshd\[14561\]: Failed password for root from 155.230.28.207 port 59328 ssh2
2020-06-12T13:15:37.436493shield sshd\[15171\]: Invalid user aokusawa from 155.230.28.207 port 59102
2020-06-12 21:23:07
91.123.17.242 attackspam
1591963678 - 06/12/2020 14:07:58 Host: 91.123.17.242/91.123.17.242 Port: 445 TCP Blocked
2020-06-12 21:42:59
78.128.113.114 attack
Jun 12 14:51:45 mail postfix/smtpd\[16711\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \
Jun 12 14:52:05 mail postfix/smtpd\[16663\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \
Jun 12 15:40:27 mail postfix/smtpd\[18765\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \
Jun 12 15:40:47 mail postfix/smtpd\[18765\]: warning: unknown\[78.128.113.114\]: SASL PLAIN authentication failed: \
2020-06-12 22:00:34
222.186.175.150 attackspambots
Jun 12 15:20:58 cosmoit sshd[17793]: Failed password for root from 222.186.175.150 port 20684 ssh2
2020-06-12 21:26:40
180.76.246.205 attackspam
Jun 12 15:07:04 lnxmail61 sshd[4697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.205
Jun 12 15:07:06 lnxmail61 sshd[4697]: Failed password for invalid user antony from 180.76.246.205 port 45216 ssh2
Jun 12 15:14:46 lnxmail61 sshd[5758]: Failed password for root from 180.76.246.205 port 56380 ssh2
2020-06-12 21:23:29
14.162.174.83 attackspambots
Jun 10 10:18:05 pl3server postfix/smtpd[1179]: warning: hostname static.vnpt.vn does not resolve to address 14.162.174.83
Jun 10 10:18:05 pl3server postfix/smtpd[1179]: warning: hostname static.vnpt.vn does not resolve to address 14.162.174.83
Jun 10 10:18:05 pl3server postfix/smtpd[1179]: connect from unknown[14.162.174.83]
Jun 10 10:18:05 pl3server postfix/smtpd[1179]: connect from unknown[14.162.174.83]
Jun 10 10:18:09 pl3server postfix/smtpd[1179]: warning: unknown[14.162.174.83]: SASL CRAM-MD5 authentication failed: authentication failure
Jun 10 10:18:09 pl3server postfix/smtpd[1179]: warning: unknown[14.162.174.83]: SASL CRAM-MD5 authentication failed: authentication failure
Jun 10 10:18:10 pl3server postfix/smtpd[1179]: warning: unknown[14.162.174.83]: SASL PLAIN authentication failed: authentication failure
Jun 10 10:18:10 pl3server postfix/smtpd[1179]: warning: unknown[14.162.174.83]: SASL PLAIN authentication failed: authentication failure


........
-----------------------------------------------
h
2020-06-12 21:44:56
101.231.146.36 attack
2020-06-12T16:19:05.927115lavrinenko.info sshd[8820]: Invalid user user1 from 101.231.146.36 port 41360
2020-06-12T16:19:05.934180lavrinenko.info sshd[8820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.146.36
2020-06-12T16:19:05.927115lavrinenko.info sshd[8820]: Invalid user user1 from 101.231.146.36 port 41360
2020-06-12T16:19:08.000185lavrinenko.info sshd[8820]: Failed password for invalid user user1 from 101.231.146.36 port 41360 ssh2
2020-06-12T16:22:44.434240lavrinenko.info sshd[9093]: Invalid user student from 101.231.146.36 port 38994
...
2020-06-12 21:24:01
115.73.138.153 attackbots
Automatic report - Port Scan Attack
2020-06-12 21:19:13
88.202.190.141 attackspam
Jun 12 14:07:47 debian-2gb-nbg1-2 kernel: \[14222388.722485\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=88.202.190.141 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=TCP SPT=3001 DPT=3001 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-12 21:50:54
85.171.52.251 attackspambots
Jun 12 14:02:52 vserver sshd\[421\]: Invalid user pany from 85.171.52.251Jun 12 14:02:54 vserver sshd\[421\]: Failed password for invalid user pany from 85.171.52.251 port 56468 ssh2Jun 12 14:07:42 vserver sshd\[474\]: Invalid user user from 85.171.52.251Jun 12 14:07:43 vserver sshd\[474\]: Failed password for invalid user user from 85.171.52.251 port 40276 ssh2
...
2020-06-12 21:55:22
167.172.156.227 attack
scans 2 times in preceeding hours on the ports (in chronological order) 23947 23947 resulting in total of 8 scans from 167.172.0.0/16 block.
2020-06-12 21:53:29

Recently Reported IPs

200.81.54.6 163.27.61.50 182.57.98.30 58.190.28.227
72.93.34.6 80.221.181.232 115.242.39.74 68.237.238.190
62.6.46.162 125.160.115.123 115.36.130.126 218.14.53.136
195.59.206.60 61.69.96.100 69.152.162.170 82.63.161.184
69.126.145.227 167.62.158.38 126.76.236.169 67.151.181.234