Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.158.138.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.158.138.5.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 22:12:45 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 5.138.158.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.138.158.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.99.180.165 attackbots
Invalid user indu from 139.99.180.165 port 45386
2020-01-23 22:17:03
40.143.228.18 attackbots
Jan 23 13:19:17 XXX sshd[31356]: Invalid user leonard from 40.143.228.18 port 50054
2020-01-23 22:03:28
179.214.194.140 attack
Invalid user roxy from 179.214.194.140 port 54406
2020-01-23 22:40:17
218.92.0.179 attack
Unauthorized connection attempt detected from IP address 218.92.0.179 to port 22 [J]
2020-01-23 21:59:01
67.205.144.236 attack
Unauthorized connection attempt detected from IP address 67.205.144.236 to port 2220 [J]
2020-01-23 22:02:45
185.203.138.192 attackbots
HTTP 503 XSS Attempt
2020-01-23 22:39:05
5.39.88.4 attackspam
"SSH brute force auth login attempt."
2020-01-23 22:23:50
178.127.154.158 attackspam
"SMTP brute force auth login attempt."
2020-01-23 22:04:52
206.189.40.20 attack
Invalid user lucas from 206.189.40.20 port 51572
2020-01-23 22:29:33
185.234.217.208 attackbots
"SMTP brute force auth login attempt."
2020-01-23 22:23:04
194.243.255.230 attack
Unauthorized connection attempt detected from IP address 194.243.255.230 to port 80 [J]
2020-01-23 22:29:51
198.245.50.81 attack
Unauthorized connection attempt detected from IP address 198.245.50.81 to port 2220 [J]
2020-01-23 21:59:34
165.227.67.64 attackbots
Unauthorized connection attempt detected from IP address 165.227.67.64 to port 2220 [J]
2020-01-23 22:35:09
205.234.159.74 attackbots
[Thu Jan 23 13:53:13.246360 2020] [authz_core:error] [pid 4767] [client 205.234.159.74:63543] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/admin
[Thu Jan 23 13:53:16.178801 2020] [authz_core:error] [pid 5168] [client 205.234.159.74:63705] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/admin
[Thu Jan 23 13:53:20.426369 2020] [authz_core:error] [pid 5452] [client 205.234.159.74:64004] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/templates
...
2020-01-23 22:15:38
106.54.114.208 attackspam
Unauthorized connection attempt detected from IP address 106.54.114.208 to port 2220 [J]
2020-01-23 22:01:37

Recently Reported IPs

78.221.174.234 129.123.218.98 175.103.196.149 115.125.134.189
62.148.45.206 234.104.221.114 211.53.83.220 242.167.46.47
150.17.181.103 78.179.50.178 182.177.253.129 45.145.246.47
244.213.179.142 161.130.239.23 84.44.55.34 85.61.233.21
150.239.204.55 103.253.91.215 97.92.204.94 234.236.148.149