Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.80.53.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.80.53.99.			IN	A

;; AUTHORITY SECTION:
.			115	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 275 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:51:44 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 99.53.80.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.53.80.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.163.168.61 attack
Unauthorized connection attempt from IP address 113.163.168.61 on Port 445(SMB)
2019-09-24 04:49:15
202.51.74.189 attackspam
SSH Brute-Force reported by Fail2Ban
2019-09-24 04:31:00
183.83.11.230 attack
Unauthorized connection attempt from IP address 183.83.11.230 on Port 445(SMB)
2019-09-24 04:45:36
180.124.180.184 attackspambots
NOQUEUE: reject: RCPT from unknown\[180.124.180.184\]: 554 5.7.1 Service unavailable\; host \[180.124.180.184\] blocked using sbl-xbl.spamhaus.org\; https://www.spamhaus.org/sbl/query/SBLCSS
2019-09-24 04:27:36
122.195.200.148 attackspam
Sep 23 22:32:46 cvbnet sshd[7126]: Failed password for root from 122.195.200.148 port 26986 ssh2
Sep 23 22:32:48 cvbnet sshd[7126]: Failed password for root from 122.195.200.148 port 26986 ssh2
2019-09-24 04:35:43
89.248.168.202 attack
09/23/2019-16:16:52.126959 89.248.168.202 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-24 04:23:31
179.108.82.109 attack
Unauthorized connection attempt from IP address 179.108.82.109 on Port 445(SMB)
2019-09-24 04:32:11
150.165.98.39 attackspambots
$f2bV_matches
2019-09-24 04:47:33
112.205.81.167 attack
Unauthorized connection attempt from IP address 112.205.81.167 on Port 445(SMB)
2019-09-24 04:42:09
186.47.21.45 attackbots
Unauthorized connection attempt from IP address 186.47.21.45 on Port 445(SMB)
2019-09-24 04:49:44
1.217.24.139 attackbotsspam
Sep 23 06:32:44 mail postfix/postscreen[1044]: PREGREET 19 after 1.1 from [1.217.24.139]:42003: EHLO litopress.it

...
2019-09-24 04:34:59
77.204.76.91 attack
Sep 23 14:00:21 XXX sshd[40913]: Invalid user ftptest from 77.204.76.91 port 54211
2019-09-24 04:42:31
62.138.1.123 attack
ssh intrusion attempt
2019-09-24 04:26:30
182.72.124.6 attackbots
Sep 23 22:21:00 dedicated sshd[25150]: Invalid user exploit from 182.72.124.6 port 52218
2019-09-24 04:46:35
92.247.201.112 attack
Sep 23 13:17:49 mail postfix/postscreen[11383]: PREGREET 36 after 0.84 from [92.247.201.112]:41268: EHLO 92-247-201-112.spectrumnet.bg

...
2019-09-24 04:47:56

Recently Reported IPs

220.83.203.93 220.83.200.9 220.84.88.108 220.84.179.125
220.87.191.210 220.86.29.124 220.84.186.4 220.88.103.27
220.89.172.153 220.88.103.30 220.90.140.150 220.90.28.60
220.92.98.177 220.94.60.161 220.93.253.1 220.92.233.217
220.95.209.140 220.95.50.109 220.93.205.72 221.0.17.251