Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dongducheon-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.148.217.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.148.217.14.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042902 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 05:41:12 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 14.217.148.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.217.148.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.86.120.109 attackbotsspam
11.07.2019 15:13:18 Connection to port 50802 blocked by firewall
2019-07-12 03:48:49
145.239.91.88 attack
Jun  3 14:59:51 server sshd\[95927\]: Invalid user nancy from 145.239.91.88
Jun  3 14:59:51 server sshd\[95927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88
Jun  3 14:59:53 server sshd\[95927\]: Failed password for invalid user nancy from 145.239.91.88 port 54284 ssh2
...
2019-07-12 04:02:21
45.228.137.6 attackspam
'Fail2Ban'
2019-07-12 04:04:15
114.226.11.177 attack
Jul 10 14:46:56 olgosrv01 sshd[1386]: reveeclipse mapping checking getaddrinfo for 177.11.226.114.broad.cz.js.dynamic.163data.com.cn [114.226.11.177] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 10 14:46:56 olgosrv01 sshd[1386]: Invalid user admin from 114.226.11.177
Jul 10 14:46:56 olgosrv01 sshd[1386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.226.11.177 
Jul 10 14:46:59 olgosrv01 sshd[1386]: Failed password for invalid user admin from 114.226.11.177 port 49153 ssh2
Jul 10 14:47:00 olgosrv01 sshd[1386]: Failed password for invalid user admin from 114.226.11.177 port 49153 ssh2
Jul 10 14:47:02 olgosrv01 sshd[1386]: Failed password for invalid user admin from 114.226.11.177 port 49153 ssh2
Jul 10 14:47:05 olgosrv01 sshd[1386]: Failed password for invalid user admin from 114.226.11.177 port 49153 ssh2
Jul 10 14:47:07 olgosrv01 sshd[1386]: Failed password for invalid user admin from 114.226.11.177 port 49153 ssh2


........
-------------------------------------------
2019-07-12 03:48:21
185.176.27.30 attackbots
firewall-block, port(s): 18995/tcp, 18996/tcp
2019-07-12 03:45:21
185.176.27.42 attackspam
11.07.2019 18:14:13 Connection to port 4385 blocked by firewall
2019-07-12 03:36:59
216.221.46.159 attackspambots
firewall-block, port(s): 23/tcp
2019-07-12 03:38:09
148.70.65.31 attackspam
Jun 28 00:11:36 server sshd\[128658\]: Invalid user hekz from 148.70.65.31
Jun 28 00:11:36 server sshd\[128658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31
Jun 28 00:11:39 server sshd\[128658\]: Failed password for invalid user hekz from 148.70.65.31 port 38720 ssh2
...
2019-07-12 03:25:26
148.70.65.167 attack
frenzy
2019-07-12 03:26:28
148.70.74.123 attackspam
Jun 21 00:27:49 server sshd\[125607\]: Invalid user server from 148.70.74.123
Jun 21 00:27:49 server sshd\[125607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.74.123
Jun 21 00:27:51 server sshd\[125607\]: Failed password for invalid user server from 148.70.74.123 port 58118 ssh2
...
2019-07-12 03:24:38
148.70.128.2 attack
May 19 03:48:17 server sshd\[206356\]: Invalid user nhserver from 148.70.128.2
May 19 03:48:17 server sshd\[206356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.128.2
May 19 03:48:18 server sshd\[206356\]: Failed password for invalid user nhserver from 148.70.128.2 port 56080 ssh2
...
2019-07-12 03:35:33
148.72.65.10 attack
Jun 16 14:23:24 server sshd\[31312\]: Invalid user nona from 148.72.65.10
Jun 16 14:23:24 server sshd\[31312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.65.10
Jun 16 14:23:26 server sshd\[31312\]: Failed password for invalid user nona from 148.72.65.10 port 45926 ssh2
...
2019-07-12 03:21:46
146.185.181.64 attack
Apr 28 14:47:25 server sshd\[73478\]: Invalid user dr from 146.185.181.64
Apr 28 14:47:25 server sshd\[73478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.181.64
Apr 28 14:47:27 server sshd\[73478\]: Failed password for invalid user dr from 146.185.181.64 port 47145 ssh2
...
2019-07-12 03:56:32
117.232.72.154 attackbots
Jul 10 15:17:20 finn sshd[12485]: Invalid user manish from 117.232.72.154 port 31026
Jul 10 15:17:20 finn sshd[12485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.232.72.154
Jul 10 15:17:22 finn sshd[12485]: Failed password for invalid user manish from 117.232.72.154 port 31026 ssh2
Jul 10 15:17:22 finn sshd[12485]: Received disconnect from 117.232.72.154 port 31026:11: Bye Bye [preauth]
Jul 10 15:17:22 finn sshd[12485]: Disconnected from 117.232.72.154 port 31026 [preauth]
Jul 10 15:21:12 finn sshd[13596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.232.72.154  user=postgres
Jul 10 15:21:14 finn sshd[13596]: Failed password for postgres from 117.232.72.154 port 15139 ssh2
Jul 10 15:21:15 finn sshd[13596]: Received disconnect from 117.232.72.154 port 15139:11: Bye Bye [preauth]
Jul 10 15:21:15 finn sshd[13596]: Disconnected from 117.232.72.154 port 15139 [preauth]


........
----------------------------------------
2019-07-12 04:06:40
14.139.153.212 attack
Jul 11 21:12:54 lnxmail61 sshd[21166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.153.212
Jul 11 21:12:56 lnxmail61 sshd[21166]: Failed password for invalid user juliette from 14.139.153.212 port 48154 ssh2
Jul 11 21:22:24 lnxmail61 sshd[22128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.153.212
2019-07-12 04:00:36

Recently Reported IPs

83.166.192.182 105.233.250.61 100.161.206.173 178.243.27.180
52.17.60.138 95.161.10.75 213.3.150.196 91.82.69.235
40.135.229.91 152.23.161.131 35.194.97.232 172.63.149.133
31.0.239.154 210.123.67.227 178.57.156.175 79.164.146.191
80.117.16.196 114.237.109.105 74.170.245.66 79.95.95.240