Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ulju-gun

Region: Ulsan Metropolitan City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.149.129.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.149.129.136.		IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:10:12 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 136.129.149.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.129.149.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.23.81.86 attackbots
Unauthorized connection attempt from IP address 182.23.81.86 on Port 445(SMB)
2020-08-19 19:50:41
27.67.228.228 attackbots
Unauthorized connection attempt from IP address 27.67.228.228 on Port 445(SMB)
2020-08-19 19:58:15
49.234.47.124 attack
sshd: Failed password for invalid user .... from 49.234.47.124 port 34306 ssh2 (4 attempts)
2020-08-19 20:31:32
118.175.11.8 attackbots
Unauthorized connection attempt from IP address 118.175.11.8 on Port 445(SMB)
2020-08-19 20:11:35
81.12.5.186 attackspambots
Unauthorized connection attempt from IP address 81.12.5.186 on Port 445(SMB)
2020-08-19 19:54:29
63.240.250.44 attackspam
Attempted connection to port 8080.
2020-08-19 20:01:31
188.17.101.100 attackspam
Unauthorized connection attempt from IP address 188.17.101.100 on Port 445(SMB)
2020-08-19 20:07:38
37.187.124.209 attackbotsspam
Invalid user minecraft from 37.187.124.209 port 37555
2020-08-19 20:25:55
15.206.17.117 attack
Invalid user seafile from 15.206.17.117 port 3854
2020-08-19 20:07:06
180.243.48.248 attack
Unauthorized connection attempt from IP address 180.243.48.248 on Port 445(SMB)
2020-08-19 20:18:35
212.64.71.225 attackbots
Invalid user evertz from 212.64.71.225 port 57258
2020-08-19 20:04:16
114.35.60.150 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-19 20:17:35
104.144.228.226 attack
(From daddario.fern@gmail.com) Hi,

We're wondering if you've ever considered taking the content from higleychiropractic.com and converting it into videos to promote on social media platforms such as Youtube?

It's another 'rod in the pond' in terms of traffic generation, as so many people use Youtube.

You can read a bit more about the software here: https://bit.ly/326uaHS

Kind Regards,
Fern
2020-08-19 20:28:45
47.245.35.63 attackbots
Aug 19 13:37:53 server sshd[31257]: Failed password for root from 47.245.35.63 port 37584 ssh2
Aug 19 13:42:43 server sshd[11078]: Failed password for root from 47.245.35.63 port 53102 ssh2
Aug 19 13:47:44 server sshd[22648]: Failed password for invalid user rar from 47.245.35.63 port 44278 ssh2
2020-08-19 19:55:03
122.160.233.137 attackspam
Aug 19 13:40:33 minden010 sshd[6348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.233.137
Aug 19 13:40:34 minden010 sshd[6348]: Failed password for invalid user postgres from 122.160.233.137 port 37182 ssh2
Aug 19 13:45:03 minden010 sshd[7226]: Failed password for root from 122.160.233.137 port 45278 ssh2
...
2020-08-19 19:56:38

Recently Reported IPs

112.147.90.243 112.148.172.76 112.148.95.131 112.148.203.114
112.148.141.54 112.147.5.10 112.148.124.205 112.147.41.206
112.147.33.58 112.148.115.206 112.148.202.22 112.147.54.39
112.147.31.18 112.147.236.104 112.148.228.66 112.147.37.145
112.147.231.160 112.147.23.190 112.147.24.191 112.147.43.123