Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.80.122.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.80.122.99.			IN	A

;; AUTHORITY SECTION:
.			296	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061001 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 03:33:41 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 99.122.80.124.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.122.80.124.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.194 attackbots
2019-12-28T06:22:14.646777scmdmz1 sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
2019-12-28T06:22:16.985602scmdmz1 sshd[2706]: Failed password for root from 112.85.42.194 port 35392 ssh2
2019-12-28T06:22:19.283518scmdmz1 sshd[2706]: Failed password for root from 112.85.42.194 port 35392 ssh2
2019-12-28T06:22:14.646777scmdmz1 sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
2019-12-28T06:22:16.985602scmdmz1 sshd[2706]: Failed password for root from 112.85.42.194 port 35392 ssh2
2019-12-28T06:22:19.283518scmdmz1 sshd[2706]: Failed password for root from 112.85.42.194 port 35392 ssh2
2019-12-28T06:22:14.646777scmdmz1 sshd[2706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194  user=root
2019-12-28T06:22:16.985602scmdmz1 sshd[2706]: Failed password for root from 112.85.42.194 port 35392 ssh2
2019-12-28T06:22:
2019-12-28 13:40:08
43.248.73.122 attackbotsspam
postfix (unknown user, SPF fail or relay access denied)
2019-12-28 13:55:07
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 48136 ssh2
Failed password for root from 222.186.175.182 port 48136 ssh2
Failed password for root from 222.186.175.182 port 48136 ssh2
Failed password for root from 222.186.175.182 port 48136 ssh2
2019-12-28 14:07:56
218.92.0.206 attackbotsspam
2019-12-28T05:52:46.149764abusebot-8.cloudsearch.cf sshd[1197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
2019-12-28T05:52:47.987160abusebot-8.cloudsearch.cf sshd[1197]: Failed password for root from 218.92.0.206 port 35394 ssh2
2019-12-28T05:52:50.009275abusebot-8.cloudsearch.cf sshd[1197]: Failed password for root from 218.92.0.206 port 35394 ssh2
2019-12-28T05:52:46.149764abusebot-8.cloudsearch.cf sshd[1197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.206  user=root
2019-12-28T05:52:47.987160abusebot-8.cloudsearch.cf sshd[1197]: Failed password for root from 218.92.0.206 port 35394 ssh2
2019-12-28T05:52:50.009275abusebot-8.cloudsearch.cf sshd[1197]: Failed password for root from 218.92.0.206 port 35394 ssh2
2019-12-28T05:52:46.149764abusebot-8.cloudsearch.cf sshd[1197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.
...
2019-12-28 14:04:27
52.30.16.188 attackspam
B: zzZZzz blocked content access
2019-12-28 14:12:28
86.21.205.149 attackspambots
Dec 28 06:40:38 sd-53420 sshd\[13808\]: Invalid user beauchesne from 86.21.205.149
Dec 28 06:40:38 sd-53420 sshd\[13808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.21.205.149
Dec 28 06:40:40 sd-53420 sshd\[13808\]: Failed password for invalid user beauchesne from 86.21.205.149 port 36004 ssh2
Dec 28 06:43:48 sd-53420 sshd\[15138\]: User root from 86.21.205.149 not allowed because none of user's groups are listed in AllowGroups
Dec 28 06:43:48 sd-53420 sshd\[15138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.21.205.149  user=root
...
2019-12-28 13:50:26
49.88.112.111 attack
Dec 28 06:28:18 cp sshd[13856]: Failed password for root from 49.88.112.111 port 22080 ssh2
Dec 28 06:28:18 cp sshd[13856]: Failed password for root from 49.88.112.111 port 22080 ssh2
Dec 28 06:28:20 cp sshd[13856]: Failed password for root from 49.88.112.111 port 22080 ssh2
2019-12-28 13:42:56
188.166.31.205 attack
Invalid user psychopa from 188.166.31.205 port 36934
2019-12-28 14:02:32
113.172.181.143 attackbots
Brute-force attempt banned
2019-12-28 13:48:33
222.186.175.148 attackbotsspam
Dec 27 19:44:17 wbs sshd\[32015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Dec 27 19:44:18 wbs sshd\[32015\]: Failed password for root from 222.186.175.148 port 64458 ssh2
Dec 27 19:44:35 wbs sshd\[32026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Dec 27 19:44:37 wbs sshd\[32026\]: Failed password for root from 222.186.175.148 port 54534 ssh2
Dec 27 19:44:53 wbs sshd\[32026\]: Failed password for root from 222.186.175.148 port 54534 ssh2
2019-12-28 13:51:27
223.31.140.242 attackspambots
19/12/27@23:57:04: FAIL: Alarm-Network address from=223.31.140.242
...
2019-12-28 14:14:13
154.183.132.246 attackbotsspam
Dec 28 05:56:50 MK-Soft-VM4 sshd[28963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.183.132.246 
Dec 28 05:56:52 MK-Soft-VM4 sshd[28963]: Failed password for invalid user admin from 154.183.132.246 port 40615 ssh2
...
2019-12-28 14:09:10
185.101.231.42 attack
Failed password for invalid user lcj5211314xdm from 185.101.231.42 port 40982 ssh2
Invalid user meland from 185.101.231.42 port 36604
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.231.42
Failed password for invalid user meland from 185.101.231.42 port 36604 ssh2
Invalid user seramin from 185.101.231.42 port 60482
2019-12-28 13:57:22
146.88.240.4 attackspambots
146.88.240.4 was recorded 118 times by 9 hosts attempting to connect to the following ports: 1900,3702,53,123,1604,5353,111,1194,47808,5060,1701,28015,27020,11211,7779,19,389,443,5683. Incident counter (4h, 24h, all-time): 118, 247, 40221
2019-12-28 14:12:10
218.92.0.135 attackspambots
Dec 28 07:03:08 51-15-180-239 sshd[18863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Dec 28 07:03:10 51-15-180-239 sshd[18863]: Failed password for root from 218.92.0.135 port 59749 ssh2
...
2019-12-28 14:13:14

Recently Reported IPs

175.115.130.134 18.51.25.210 119.252.14.88 121.186.34.227
91.65.86.145 100.83.238.248 37.84.220.247 209.69.231.107
84.84.229.147 69.189.15.31 19.156.229.229 45.99.208.244
213.137.198.218 49.175.179.19 111.29.242.103 116.7.126.28
233.139.72.178 178.16.98.41 132.100.18.155 54.99.152.255