Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.164.135.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.164.135.130.		IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:06:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 130.135.164.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.135.164.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.251.68.194 attack
Automatic report - Port Scan Attack
2019-10-09 18:20:31
159.226.118.184 attack
Jul 29 13:05:52 server sshd\[148350\]: Invalid user git from 159.226.118.184
Jul 29 13:05:52 server sshd\[148350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.118.184
Jul 29 13:05:53 server sshd\[148350\]: Failed password for invalid user git from 159.226.118.184 port 53275 ssh2
...
2019-10-09 17:48:36
36.112.128.99 attack
Oct  9 07:08:05 www sshd\[49502\]: Invalid user Juliette2016 from 36.112.128.99Oct  9 07:08:07 www sshd\[49502\]: Failed password for invalid user Juliette2016 from 36.112.128.99 port 44659 ssh2Oct  9 07:13:28 www sshd\[49712\]: Invalid user Box2017 from 36.112.128.99
...
2019-10-09 17:58:57
188.166.232.14 attackspambots
2019-10-09T08:15:40.847760abusebot-3.cloudsearch.cf sshd\[20100\]: Invalid user !qaZ@wsX\#edC  from 188.166.232.14 port 43786
2019-10-09 17:56:02
50.62.177.91 attack
abcdata-sys.de:80 50.62.177.91 - - \[09/Oct/2019:05:52:16 +0200\] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "Poster"
www.goldgier.de 50.62.177.91 \[09/Oct/2019:05:52:17 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4484 "-" "Poster"
2019-10-09 17:52:57
159.203.198.34 attackbots
$f2bV_matches
2019-10-09 17:57:25
133.130.113.107 attackbots
Oct  9 09:30:00 venus sshd\[29184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.113.107  user=root
Oct  9 09:30:02 venus sshd\[29184\]: Failed password for root from 133.130.113.107 port 43458 ssh2
Oct  9 09:33:57 venus sshd\[29239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.113.107  user=root
...
2019-10-09 17:48:20
162.243.58.198 attackspambots
Oct  9 05:49:27 xeon cyrus/imap[19734]: badlogin: [162.243.58.198] plain [SASL(-13): authentication failure: Password verification failed]
2019-10-09 18:12:37
159.203.2.17 attack
Aug  4 10:15:22 server sshd\[52234\]: Invalid user edgar from 159.203.2.17
Aug  4 10:15:22 server sshd\[52234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.2.17
Aug  4 10:15:24 server sshd\[52234\]: Failed password for invalid user edgar from 159.203.2.17 port 43236 ssh2
...
2019-10-09 17:56:31
49.35.197.129 attackbotsspam
B: /wp-login.php attack
2019-10-09 17:51:49
159.203.103.120 attack
Jun 19 19:09:10 server sshd\[25987\]: Invalid user admin from 159.203.103.120
Jun 19 19:09:10 server sshd\[25987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.103.120
Jun 19 19:09:12 server sshd\[25987\]: Failed password for invalid user admin from 159.203.103.120 port 53390 ssh2
...
2019-10-09 18:09:40
159.203.77.51 attack
2019-10-09T08:26:27.447891abusebot-7.cloudsearch.cf sshd\[22352\]: Invalid user user from 159.203.77.51 port 51238
2019-10-09 17:52:35
80.53.7.213 attackbots
Oct  9 09:47:54 game-panel sshd[19475]: Failed password for root from 80.53.7.213 port 56644 ssh2
Oct  9 09:52:02 game-panel sshd[19626]: Failed password for root from 80.53.7.213 port 48041 ssh2
2019-10-09 18:22:03
178.32.10.94 attackspam
2019-10-09T09:59:29.246725abusebot-7.cloudsearch.cf sshd\[22871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip94.ip-178-32-10.eu  user=root
2019-10-09 18:11:24
61.126.47.234 attackspambots
Automatic report - Banned IP Access
2019-10-09 17:43:45

Recently Reported IPs

112.154.53.231 112.164.253.207 112.157.72.188 112.165.127.162
112.164.216.8 112.169.159.197 112.164.177.94 112.170.30.83
112.17.237.174 112.175.10.112 112.171.41.145 112.17.39.150
112.175.247.157 112.175.31.237 112.175.31.232 112.175.235.219
112.175.118.203 112.175.50.228 112.175.184.152 112.175.99.145