Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gangnam-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.145.116.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.145.116.164.		IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:11:04 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 164.116.145.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.116.145.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.113.193.134 attack
9001/tcp 9000/tcp
[2019-11-18/20]2pkt
2019-11-21 04:44:03
180.76.109.211 attackbotsspam
Nov 20 10:34:10 kapalua sshd\[11485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.109.211  user=root
Nov 20 10:34:13 kapalua sshd\[11485\]: Failed password for root from 180.76.109.211 port 55238 ssh2
Nov 20 10:38:22 kapalua sshd\[11875\]: Invalid user com!@ from 180.76.109.211
Nov 20 10:38:22 kapalua sshd\[11875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.109.211
Nov 20 10:38:24 kapalua sshd\[11875\]: Failed password for invalid user com!@ from 180.76.109.211 port 57974 ssh2
2019-11-21 04:53:41
65.52.210.127 attackbotsspam
1433/tcp 1433/tcp
[2019-10-07/11-20]2pkt
2019-11-21 04:21:40
110.247.102.166 attackspam
23/tcp 23/tcp 5500/tcp
[2019-11-12/20]3pkt
2019-11-21 04:45:21
118.71.244.45 attack
Unauthorised access (Nov 20) SRC=118.71.244.45 LEN=52 TTL=107 ID=17815 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-21 04:36:07
203.99.59.226 attackspambots
445/tcp 445/tcp 445/tcp
[2019-10-11/11-20]3pkt
2019-11-21 04:24:13
2a00:d680:10:50::22 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-21 04:26:12
124.118.234.190 attackbots
" "
2019-11-21 04:37:55
193.188.22.193 attackbots
Fail2Ban Ban Triggered
2019-11-21 04:48:11
74.82.47.14 attackspambots
23/tcp 2323/tcp 548/tcp...
[2019-09-21/11-20]27pkt,15pt.(tcp),1pt.(udp)
2019-11-21 04:40:43
61.12.38.162 attack
$f2bV_matches
2019-11-21 04:16:14
52.165.88.121 attack
Invalid user melliand from 52.165.88.121 port 41572
2019-11-21 04:47:50
42.114.13.193 attackbotsspam
445/tcp
[2019-11-20]1pkt
2019-11-21 04:49:06
129.213.122.26 attackspambots
Tried sshing with brute force.
2019-11-21 04:32:58
52.162.239.76 attackbots
Nov 20 20:01:37 DAAP sshd[27407]: Invalid user fabricius from 52.162.239.76 port 48262
Nov 20 20:01:37 DAAP sshd[27407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.162.239.76
Nov 20 20:01:37 DAAP sshd[27407]: Invalid user fabricius from 52.162.239.76 port 48262
Nov 20 20:01:39 DAAP sshd[27407]: Failed password for invalid user fabricius from 52.162.239.76 port 48262 ssh2
Nov 20 20:05:13 DAAP sshd[27451]: Invalid user debelian from 52.162.239.76 port 59466
...
2019-11-21 04:49:24

Recently Reported IPs

112.144.66.242 112.145.194.187 112.145.195.86 112.144.236.115
112.144.24.174 112.144.227.31 112.144.225.184 112.144.22.123
112.144.2.146 112.144.185.217 112.144.179.215 112.144.171.62
112.146.116.118 112.144.231.51 112.144.135.202 112.144.129.119
112.144.230.89 112.144.45.149 112.144.130.87 112.144.131.251