Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gangnam-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.149.148.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.149.148.252.		IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024081402 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 15 12:09:58 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 252.148.149.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.148.149.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.74.24.34 attack
Port Scan: Events[1] countPorts[27]: 1432 1434 1444 1500 2433 4433 5433 6433 7433 8433 9433 14330 14331 14332 14333 14334 14335 14336 14337 14338 14339 14433 21433 31433 41433 51433 61433 ..
2020-04-18 15:36:52
118.27.13.124 attack
$f2bV_matches
2020-04-18 15:05:48
142.93.211.44 attackspam
Invalid user fi from 142.93.211.44 port 35362
2020-04-18 15:11:52
104.196.4.163 attackspam
Invalid user sniff from 104.196.4.163 port 44972
2020-04-18 15:01:17
92.63.194.25 attackspam
Apr 18 06:16:37 IngegnereFirenze sshd[32258]: Failed password for invalid user Administrator from 92.63.194.25 port 39959 ssh2
...
2020-04-18 15:33:18
194.28.61.132 attack
Fail2Ban Ban Triggered
2020-04-18 15:31:58
92.63.194.90 attack
2020-04-18T06:57:19.540106abusebot-5.cloudsearch.cf sshd[5174]: Invalid user 1234 from 92.63.194.90 port 48614
2020-04-18T06:57:19.546313abusebot-5.cloudsearch.cf sshd[5174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
2020-04-18T06:57:19.540106abusebot-5.cloudsearch.cf sshd[5174]: Invalid user 1234 from 92.63.194.90 port 48614
2020-04-18T06:57:21.848243abusebot-5.cloudsearch.cf sshd[5174]: Failed password for invalid user 1234 from 92.63.194.90 port 48614 ssh2
2020-04-18T06:58:13.301203abusebot-5.cloudsearch.cf sshd[5273]: Invalid user user from 92.63.194.90 port 45660
2020-04-18T06:58:13.309768abusebot-5.cloudsearch.cf sshd[5273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
2020-04-18T06:58:13.301203abusebot-5.cloudsearch.cf sshd[5273]: Invalid user user from 92.63.194.90 port 45660
2020-04-18T06:58:15.024603abusebot-5.cloudsearch.cf sshd[5273]: Failed password for invali
...
2020-04-18 15:05:17
183.89.211.193 attackspambots
B: Magento admin pass test (wrong country)
2020-04-18 15:21:01
35.200.165.32 attackbotsspam
Apr 18 09:07:29 h2779839 sshd[22082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.165.32  user=root
Apr 18 09:07:31 h2779839 sshd[22082]: Failed password for root from 35.200.165.32 port 37188 ssh2
Apr 18 09:12:09 h2779839 sshd[22209]: Invalid user ubuntu from 35.200.165.32 port 59714
Apr 18 09:12:09 h2779839 sshd[22209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.165.32
Apr 18 09:12:09 h2779839 sshd[22209]: Invalid user ubuntu from 35.200.165.32 port 59714
Apr 18 09:12:10 h2779839 sshd[22209]: Failed password for invalid user ubuntu from 35.200.165.32 port 59714 ssh2
Apr 18 09:13:54 h2779839 sshd[22244]: Invalid user ftpuser from 35.200.165.32 port 54704
Apr 18 09:13:54 h2779839 sshd[22244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.165.32
Apr 18 09:13:54 h2779839 sshd[22244]: Invalid user ftpuser from 35.200.165.32 port 54704
Apr 
...
2020-04-18 15:31:09
114.25.186.139 attack
(FakeHost) Fake Host From  114.25.186.139 (TW/Taiwan/114-25-186-139.dynamic-ip.hinet.net): 1 in the last 3600 secs
2020-04-18 15:04:39
93.174.93.216 attackspam
CMS (WordPress or Joomla) login attempt.
2020-04-18 15:23:37
114.231.41.90 attack
Brute force attempt
2020-04-18 15:30:04
92.63.194.59 attackspambots
2020-04-18T06:57:09.157136abusebot-5.cloudsearch.cf sshd[5172]: Invalid user admin from 92.63.194.59 port 37389
2020-04-18T06:57:09.172662abusebot-5.cloudsearch.cf sshd[5172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.59
2020-04-18T06:57:09.157136abusebot-5.cloudsearch.cf sshd[5172]: Invalid user admin from 92.63.194.59 port 37389
2020-04-18T06:57:11.103039abusebot-5.cloudsearch.cf sshd[5172]: Failed password for invalid user admin from 92.63.194.59 port 37389 ssh2
2020-04-18T06:58:08.847388abusebot-5.cloudsearch.cf sshd[5193]: Invalid user admin from 92.63.194.59 port 44797
2020-04-18T06:58:08.853922abusebot-5.cloudsearch.cf sshd[5193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.59
2020-04-18T06:58:08.847388abusebot-5.cloudsearch.cf sshd[5193]: Invalid user admin from 92.63.194.59 port 44797
2020-04-18T06:58:10.548719abusebot-5.cloudsearch.cf sshd[5193]: Failed password for i
...
2020-04-18 15:17:41
106.12.215.238 attack
Invalid user admin from 106.12.215.238 port 41850
2020-04-18 15:23:15
171.231.244.12 spamattack
Mail hack
2020-04-18 15:02:16

Recently Reported IPs

112.149.217.157 112.148.69.207 112.148.93.66 112.148.70.173
112.148.59.14 112.149.107.88 112.149.21.215 112.148.99.62
112.149.235.123 112.148.247.220 112.149.167.144 112.149.141.71
112.148.22.198 112.148.219.219 112.148.30.197 112.148.77.80
112.148.48.169 112.148.208.161 112.148.205.235 112.148.188.180