Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.216.142.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.216.142.127.		IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 08 04:17:57 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 127.142.216.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.142.216.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.9 attackbots
Oct 27 09:57:37 firewall sshd[19673]: Failed password for root from 222.186.180.9 port 34154 ssh2
Oct 27 09:57:37 firewall sshd[19673]: error: maximum authentication attempts exceeded for root from 222.186.180.9 port 34154 ssh2 [preauth]
Oct 27 09:57:37 firewall sshd[19673]: Disconnecting: Too many authentication failures [preauth]
...
2019-10-27 21:01:46
222.186.173.154 attackspam
Oct 27 13:45:38 meumeu sshd[26143]: Failed password for root from 222.186.173.154 port 62136 ssh2
Oct 27 13:45:43 meumeu sshd[26143]: Failed password for root from 222.186.173.154 port 62136 ssh2
Oct 27 13:45:50 meumeu sshd[26143]: Failed password for root from 222.186.173.154 port 62136 ssh2
Oct 27 13:45:54 meumeu sshd[26143]: Failed password for root from 222.186.173.154 port 62136 ssh2
...
2019-10-27 20:59:07
104.200.110.191 attackbotsspam
Oct 27 14:08:46 dedicated sshd[15427]: Invalid user Trucks from 104.200.110.191 port 38798
Oct 27 14:08:46 dedicated sshd[15427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.200.110.191 
Oct 27 14:08:46 dedicated sshd[15427]: Invalid user Trucks from 104.200.110.191 port 38798
Oct 27 14:08:47 dedicated sshd[15427]: Failed password for invalid user Trucks from 104.200.110.191 port 38798 ssh2
Oct 27 14:13:10 dedicated sshd[16160]: Invalid user xie from 104.200.110.191 port 49456
2019-10-27 21:19:50
82.49.63.178 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/82.49.63.178/ 
 
 IT - 1H : (83)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN3269 
 
 IP : 82.49.63.178 
 
 CIDR : 82.49.0.0/16 
 
 PREFIX COUNT : 550 
 
 UNIQUE IP COUNT : 19507712 
 
 
 ATTACKS DETECTED ASN3269 :  
  1H - 3 
  3H - 6 
  6H - 18 
 12H - 34 
 24H - 37 
 
 DateTime : 2019-10-27 13:08:08 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-27 21:23:48
89.248.169.17 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2019-10-27 21:24:53
46.105.110.70 attackspam
Oct 27 13:08:07 bouncer sshd\[31640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.110.70  user=root
Oct 27 13:08:07 bouncer sshd\[31642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.110.70  user=root
Oct 27 13:08:07 bouncer sshd\[31641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.110.70  user=root
...
2019-10-27 21:25:12
78.90.67.126 attackspam
Oct 27 13:21:40 MK-Soft-VM7 sshd[5346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.90.67.126 
Oct 27 13:21:42 MK-Soft-VM7 sshd[5346]: Failed password for invalid user ubuntu from 78.90.67.126 port 18603 ssh2
...
2019-10-27 21:04:58
94.158.213.231 attack
Honeypot attack, port: 5555, PTR: 231.213-158-94.FTTB.maxitel.ru.
2019-10-27 21:05:16
159.65.189.115 attackbotsspam
Oct 27 13:51:02 legacy sshd[15717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.189.115
Oct 27 13:51:04 legacy sshd[15717]: Failed password for invalid user tammy from 159.65.189.115 port 37504 ssh2
Oct 27 13:54:48 legacy sshd[15791]: Failed password for root from 159.65.189.115 port 46516 ssh2
...
2019-10-27 20:58:20
106.12.60.137 attackspam
Oct 27 13:23:20 OPSO sshd\[6160\]: Invalid user bamboo from 106.12.60.137 port 34004
Oct 27 13:23:20 OPSO sshd\[6160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.137
Oct 27 13:23:22 OPSO sshd\[6160\]: Failed password for invalid user bamboo from 106.12.60.137 port 34004 ssh2
Oct 27 13:28:28 OPSO sshd\[7092\]: Invalid user root1 from 106.12.60.137 port 44422
Oct 27 13:28:28 OPSO sshd\[7092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.60.137
2019-10-27 20:57:25
122.170.3.83 attackbots
Honeypot attack, port: 23, PTR: privilegehotels.in.
2019-10-27 20:59:55
81.22.45.107 attackbotsspam
Oct 27 14:20:27 mc1 kernel: \[3468760.805987\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29212 PROTO=TCP SPT=46683 DPT=30514 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 14:21:15 mc1 kernel: \[3468808.347700\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=35609 PROTO=TCP SPT=46683 DPT=30815 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 27 14:23:37 mc1 kernel: \[3468950.181311\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=47146 PROTO=TCP SPT=46683 DPT=31320 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-27 21:26:47
162.248.52.82 attack
Oct 27 12:48:43 venus sshd\[15701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82  user=root
Oct 27 12:48:45 venus sshd\[15701\]: Failed password for root from 162.248.52.82 port 46292 ssh2
Oct 27 12:52:45 venus sshd\[15768\]: Invalid user li from 162.248.52.82 port 58176
...
2019-10-27 21:07:48
58.47.177.158 attack
Oct 27 13:07:58 v22018076622670303 sshd\[2929\]: Invalid user sell from 58.47.177.158 port 46969
Oct 27 13:07:58 v22018076622670303 sshd\[2929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.158
Oct 27 13:08:00 v22018076622670303 sshd\[2929\]: Failed password for invalid user sell from 58.47.177.158 port 46969 ssh2
...
2019-10-27 21:30:13
210.183.21.48 attackbotsspam
[ssh] SSH attack
2019-10-27 21:34:26

Recently Reported IPs

112.217.2.88 112.216.163.184 112.216.113.183 112.215.99.97
112.216.122.70 112.216.104.68 112.216.210.66 112.216.240.26
112.216.105.205 112.215.65.200 112.215.55.41 112.215.46.190
112.216.230.253 112.215.65.7 112.216.103.144 112.218.3.178
112.215.3.226 112.215.35.94 112.217.246.109 112.215.247.124