Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pohang

Region: Gyeongsangbuk-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.145.0.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.145.0.253.			IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:10:59 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 253.0.145.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.0.145.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.22.106.134 attackspam
Honeypot attack, port: 445, PTR: 184-22-106-0.24.nat.tls1b-cgn02.myaisfibre.com.
2020-02-11 02:24:07
183.200.10.132 attackspambots
Automatic report - Port Scan
2020-02-11 03:04:07
103.230.107.229 attackspam
$lgm
2020-02-11 02:57:14
202.4.186.88 attackbots
$f2bV_matches
2020-02-11 02:59:37
202.45.147.125 attack
$f2bV_matches
2020-02-11 02:56:31
202.29.39.1 attackbotsspam
$f2bV_matches
2020-02-11 03:05:46
218.250.234.176 attackspambots
Honeypot attack, port: 5555, PTR: n218250234176.netvigator.com.
2020-02-11 02:30:53
202.5.36.56 attack
$f2bV_matches
2020-02-11 02:54:44
216.117.55.210 attack
ICMP MH Probe, Scan /Distributed -
2020-02-11 02:24:39
132.255.216.123 attackbots
Automatic report - Port Scan Attack
2020-02-11 02:55:01
202.71.176.134 attackspambots
$f2bV_matches
2020-02-11 02:25:23
162.243.128.11 attackspam
Port probing on unauthorized port 520
2020-02-11 02:48:37
202.73.9.76 attackbotsspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.9.76 
Failed password for invalid user uah from 202.73.9.76 port 46733 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.73.9.76
2020-02-11 02:25:00
202.29.98.39 attack
$f2bV_matches
2020-02-11 03:02:07
80.75.15.130 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 02:39:14

Recently Reported IPs

112.145.101.16 112.147.102.104 112.144.79.81 112.145.61.32
112.145.145.58 112.144.51.20 112.144.62.86 112.144.66.242
112.145.116.164 112.145.194.187 112.145.195.86 112.144.236.115
112.144.24.174 112.144.227.31 112.144.225.184 112.144.22.123
112.144.2.146 112.144.185.217 112.144.179.215 112.144.171.62