Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: Data Communication Business Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
59.124.230.138 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 43 - port: 10943 proto: tcp cat: Misc Attackbytes: 60
2020-10-08 03:01:26
59.124.230.138 attack
31269/tcp 3479/tcp 20911/tcp...
[2020-08-31/10-06]35pkt,25pt.(tcp)
2020-10-07 19:15:33
59.124.205.214 attackbots
(sshd) Failed SSH login from 59.124.205.214 (TW/Taiwan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 13:01:44 server2 sshd[31516]: Invalid user kibana from 59.124.205.214
Sep 28 13:01:46 server2 sshd[31516]: Failed password for invalid user kibana from 59.124.205.214 port 45612 ssh2
Sep 28 13:13:22 server2 sshd[19151]: Invalid user mathserv from 59.124.205.214
Sep 28 13:13:24 server2 sshd[19151]: Failed password for invalid user mathserv from 59.124.205.214 port 48440 ssh2
Sep 28 13:17:23 server2 sshd[27180]: Invalid user new from 59.124.205.214
2020-09-29 03:14:12
59.124.205.214 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-28 19:24:17
59.124.230.138 attackbotsspam
 TCP (SYN) 59.124.230.138:52340 -> port 1148, len 44
2020-09-12 21:14:41
59.124.230.138 attackspambots
 TCP (SYN) 59.124.230.138:52340 -> port 1148, len 44
2020-09-12 13:17:49
59.124.230.138 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-12 05:05:42
59.124.205.214 attackbots
Aug 24 10:36:26 ift sshd\[12183\]: Invalid user shells from 59.124.205.214Aug 24 10:36:27 ift sshd\[12183\]: Failed password for invalid user shells from 59.124.205.214 port 43930 ssh2Aug 24 10:40:04 ift sshd\[12781\]: Invalid user ftpuser from 59.124.205.214Aug 24 10:40:06 ift sshd\[12781\]: Failed password for invalid user ftpuser from 59.124.205.214 port 44658 ssh2Aug 24 10:43:27 ift sshd\[13131\]: Invalid user orangepi from 59.124.205.214
...
2020-08-24 16:51:49
59.124.205.214 attackspam
Aug 20 14:53:35 l03 sshd[8595]: Invalid user bp from 59.124.205.214 port 52950
...
2020-08-20 22:02:07
59.124.205.214 attackspam
Aug 13 00:03:50 server sshd[10400]: Failed password for root from 59.124.205.214 port 33554 ssh2
Aug 13 00:06:45 server sshd[11845]: Failed password for root from 59.124.205.214 port 53120 ssh2
Aug 13 00:09:39 server sshd[13021]: Failed password for root from 59.124.205.214 port 44460 ssh2
2020-08-13 06:50:45
59.124.2.155 attackspam
 TCP (SYN) 59.124.2.155:57616 -> port 1433, len 40
2020-08-13 03:05:19
59.124.205.214 attackspambots
2020-07-30T00:34:34.936475vps773228.ovh.net sshd[3838]: Invalid user nisuser2 from 59.124.205.214 port 36514
2020-07-30T00:34:34.944936vps773228.ovh.net sshd[3838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-124-205-214.hinet-ip.hinet.net
2020-07-30T00:34:34.936475vps773228.ovh.net sshd[3838]: Invalid user nisuser2 from 59.124.205.214 port 36514
2020-07-30T00:34:36.626628vps773228.ovh.net sshd[3838]: Failed password for invalid user nisuser2 from 59.124.205.214 port 36514 ssh2
2020-07-30T00:38:37.619546vps773228.ovh.net sshd[3890]: Invalid user yyg from 59.124.205.214 port 47758
...
2020-07-30 07:47:54
59.124.205.214 attack
wp BF attempts
2020-07-27 15:05:58
59.124.205.214 attackbotsspam
Jul 11 19:09:55 vps sshd[5211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.205.214 
Jul 11 19:09:57 vps sshd[5211]: Failed password for invalid user admin from 59.124.205.214 port 45844 ssh2
Jul 11 19:16:59 vps sshd[5529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.205.214 
...
2020-07-12 02:12:00
59.124.205.214 attackbots
Jun 15 10:05:30 Host-KLAX-C sshd[25545]: Disconnected from invalid user root 59.124.205.214 port 48470 [preauth]
...
2020-06-16 00:11:07
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.124.2.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54089
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;59.124.2.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 19 16:23:35 CST 2019
;; MSG SIZE  rcvd: 115
Host info
50.2.124.59.in-addr.arpa domain name pointer 59-124-2-50.HINET-IP.hinet.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.2.124.59.in-addr.arpa	name = 59-124-2-50.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.48.241 attack
Oct  3 09:09:54 mail1 sshd\[7913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241  user=alex
Oct  3 09:09:56 mail1 sshd\[7913\]: Failed password for alex from 106.13.48.241 port 43976 ssh2
Oct  3 09:15:37 mail1 sshd\[10487\]: Invalid user user from 106.13.48.241 port 53802
Oct  3 09:15:37 mail1 sshd\[10487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.241
Oct  3 09:15:39 mail1 sshd\[10487\]: Failed password for invalid user user from 106.13.48.241 port 53802 ssh2
...
2019-10-03 18:00:39
134.209.97.61 attackspam
2019-09-11 20:20:12,255 fail2ban.actions        [814]: NOTICE  [sshd] Ban 134.209.97.61
2019-09-11 23:26:54,579 fail2ban.actions        [814]: NOTICE  [sshd] Ban 134.209.97.61
2019-09-12 02:36:19,426 fail2ban.actions        [814]: NOTICE  [sshd] Ban 134.209.97.61
...
2019-10-03 18:27:37
202.51.74.189 attackbots
Oct  3 10:19:01 mail sshd\[7377\]: Invalid user ppo from 202.51.74.189
Oct  3 10:19:01 mail sshd\[7377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Oct  3 10:19:03 mail sshd\[7377\]: Failed password for invalid user ppo from 202.51.74.189 port 41374 ssh2
...
2019-10-03 18:06:27
110.231.55.13 attackspambots
(Oct  3)  LEN=40 TTL=48 ID=15935 TCP DPT=8080 WINDOW=53484 SYN 
 (Oct  3)  LEN=40 TTL=48 ID=62817 TCP DPT=8080 WINDOW=40474 SYN 
 (Oct  3)  LEN=40 TTL=48 ID=57018 TCP DPT=8080 WINDOW=1910 SYN 
 (Oct  2)  LEN=40 TTL=48 ID=31286 TCP DPT=8080 WINDOW=61031 SYN 
 (Oct  2)  LEN=40 TTL=48 ID=60352 TCP DPT=8080 WINDOW=38175 SYN 
 (Oct  2)  LEN=40 TTL=48 ID=7015 TCP DPT=8080 WINDOW=32487 SYN 
 (Oct  1)  LEN=40 TTL=48 ID=44946 TCP DPT=8080 WINDOW=53484 SYN 
 (Oct  1)  LEN=40 TTL=48 ID=62968 TCP DPT=8080 WINDOW=42274 SYN 
 (Oct  1)  LEN=40 TTL=48 ID=47442 TCP DPT=8080 WINDOW=9945 SYN 
 (Oct  1)  LEN=40 TTL=48 ID=30628 TCP DPT=8080 WINDOW=64257 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=63843 TCP DPT=8080 WINDOW=9945 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=448 TCP DPT=8080 WINDOW=9945 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=29286 TCP DPT=8080 WINDOW=9945 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=9272 TCP DPT=8080 WINDOW=64257 SYN 
 (Sep 30)  LEN=40 TTL=48 ID=24437 TCP DPT=8080 WINDOW=64257 SYN
2019-10-03 18:30:46
216.170.114.20 attackbots
icarus github smtp honeypot
2019-10-03 18:02:20
46.13.162.98 attackbotsspam
Chat Spam
2019-10-03 18:32:21
91.121.222.79 attack
Fail2Ban Ban Triggered
2019-10-03 18:34:07
88.99.2.180 attack
Automatic report - XMLRPC Attack
2019-10-03 18:34:37
134.209.81.60 attackspambots
2019-09-04 03:44:12,305 fail2ban.actions        [804]: NOTICE  [sshd] Ban 134.209.81.60
2019-09-04 06:51:50,604 fail2ban.actions        [804]: NOTICE  [sshd] Ban 134.209.81.60
2019-09-04 10:00:32,805 fail2ban.actions        [804]: NOTICE  [sshd] Ban 134.209.81.60
...
2019-10-03 18:38:41
218.92.0.157 attackspam
Oct  3 06:22:53 apollo sshd\[15332\]: Failed password for root from 218.92.0.157 port 63052 ssh2Oct  3 06:22:57 apollo sshd\[15332\]: Failed password for root from 218.92.0.157 port 63052 ssh2Oct  3 06:22:59 apollo sshd\[15332\]: Failed password for root from 218.92.0.157 port 63052 ssh2
...
2019-10-03 18:06:00
91.222.236.177 attackspam
B: Magento admin pass test (wrong country)
2019-10-03 18:12:31
137.116.87.196 attackspam
2019-08-31 09:08:56,036 fail2ban.actions        [804]: NOTICE  [sshd] Ban 137.116.87.196
2019-08-31 12:20:36,911 fail2ban.actions        [804]: NOTICE  [sshd] Ban 137.116.87.196
2019-08-31 15:33:40,007 fail2ban.actions        [804]: NOTICE  [sshd] Ban 137.116.87.196
...
2019-10-03 18:23:34
139.217.223.143 attack
2019-10-03T07:01:26.953441Z 8c447c27bb13 New connection: 139.217.223.143:51816 (172.17.0.2:2222) [session: 8c447c27bb13]
2019-10-03T07:12:20.481745Z 41a2af4d7881 New connection: 139.217.223.143:43456 (172.17.0.2:2222) [session: 41a2af4d7881]
2019-10-03 18:24:53
62.234.95.55 attack
Oct  2 20:33:57 auw2 sshd\[11591\]: Invalid user lemancaf_leman from 62.234.95.55
Oct  2 20:33:57 auw2 sshd\[11591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.55
Oct  2 20:33:59 auw2 sshd\[11591\]: Failed password for invalid user lemancaf_leman from 62.234.95.55 port 47166 ssh2
Oct  2 20:39:42 auw2 sshd\[12361\]: Invalid user elastic from 62.234.95.55
Oct  2 20:39:42 auw2 sshd\[12361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.55
2019-10-03 18:25:21
142.93.26.245 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-10-03 18:26:24

Recently Reported IPs

40.144.196.22 211.204.196.213 84.237.210.92 138.28.238.81
178.168.22.115 32.98.228.227 169.5.54.184 79.123.181.41
109.235.217.67 119.171.80.21 60.175.222.155 222.38.185.238
57.234.182.167 143.149.7.197 72.252.140.233 223.136.4.21
177.184.146.198 175.147.72.124 53.248.60.122 109.73.181.109