Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.49.80.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.49.80.220.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 17:33:47 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 220.80.49.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.80.49.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.128.247.113 attack
Invalid user ul from 27.128.247.113 port 63169
2020-04-22 17:09:42
80.232.246.116 attack
$f2bV_matches
2020-04-22 17:07:30
114.97.185.67 attackspam
(smtpauth) Failed SMTP AUTH login from 114.97.185.67 (CN/China/-): 5 in the last 3600 secs
2020-04-22 17:36:06
24.222.39.162 attackspam
Apr 21 20:04:05 sachi sshd\[11457\]: Invalid user jb from 24.222.39.162
Apr 21 20:04:05 sachi sshd\[11457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-24-222-39-162.public.eastlink.ca
Apr 21 20:04:07 sachi sshd\[11457\]: Failed password for invalid user jb from 24.222.39.162 port 37487 ssh2
Apr 21 20:12:04 sachi sshd\[12148\]: Invalid user cr from 24.222.39.162
Apr 21 20:12:04 sachi sshd\[12148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-24-222-39-162.public.eastlink.ca
2020-04-22 17:23:39
162.243.134.25 attackbots
Port scan(s) denied
2020-04-22 17:32:16
201.90.101.165 attackbotsspam
$f2bV_matches
2020-04-22 17:30:09
49.232.97.184 attack
Wordpress malicious attack:[sshd]
2020-04-22 17:20:40
168.90.89.35 attackbots
Invalid user test from 168.90.89.35 port 33295
2020-04-22 17:17:05
113.161.222.73 attackbotsspam
DATE:2020-04-22 06:18:24, IP:113.161.222.73, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-04-22 17:37:43
87.251.74.245 attackspambots
Port scan on 6 port(s): 690 935 21314 27271 29298 46566
2020-04-22 17:01:11
113.173.216.233 attackspam
failed_logins
2020-04-22 17:32:00
188.158.44.22 attackbotsspam
firewall-block, port(s): 9530/tcp
2020-04-22 17:27:55
142.93.101.30 attack
04/22/2020-03:28:02.807155 142.93.101.30 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-22 17:35:45
51.91.105.120 attackspam
Apr 22 10:39:01 vps647732 sshd[7914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.105.120
Apr 22 10:39:03 vps647732 sshd[7914]: Failed password for invalid user tomcat from 51.91.105.120 port 35174 ssh2
...
2020-04-22 17:34:00
111.229.235.119 attackbotsspam
Wordpress malicious attack:[sshd]
2020-04-22 17:00:55

Recently Reported IPs

217.53.28.93 212.32.102.155 218.122.128.201 124.238.205.35
92.94.182.137 104.106.139.94 152.232.66.152 52.169.231.29
55.247.151.170 9.158.79.198 68.18.165.130 232.182.237.239
142.238.6.147 125.222.180.244 154.73.204.0 116.248.137.104
163.198.163.15 99.2.47.251 234.32.21.177 69.195.58.113