Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.129.81.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.129.81.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:59:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.81.129.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.81.129.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
63.82.48.62 attack
Mar 12 05:54:50 mail.srvfarm.net postfix/smtpd[1662761]: NOQUEUE: reject: RCPT from rifle.ehfizi.com[63.82.48.62]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 05:56:48 mail.srvfarm.net postfix/smtpd[1659245]: NOQUEUE: reject: RCPT from rifle.ehfizi.com[63.82.48.62]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 05:56:48 mail.srvfarm.net postfix/smtpd[1659249]: NOQUEUE: reject: RCPT from rifle.ehfizi.com[63.82.48.62]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 05:56:48 mail.srvfarm.net postfix/smtpd[1662761]: NOQUEUE: reject: RC
2020-03-12 13:23:37
62.234.83.138 attack
Mar 12 05:27:39 serwer sshd\[17456\]: Invalid user test01 from 62.234.83.138 port 59422
Mar 12 05:27:39 serwer sshd\[17456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.83.138
Mar 12 05:27:40 serwer sshd\[17456\]: Failed password for invalid user test01 from 62.234.83.138 port 59422 ssh2
...
2020-03-12 13:57:51
41.193.122.77 attack
Mar 12 03:55:11 *** sshd[4987]: Invalid user pi from 41.193.122.77
2020-03-12 13:28:55
49.235.96.253 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-12 13:56:25
116.105.216.179 attack
Mar 12 06:27:27 tuxlinux sshd[9530]: Invalid user admin from 116.105.216.179 port 33860
...
2020-03-12 13:28:35
171.254.159.49 attack
Mar 12 05:54:40 ncomp sshd[8686]: Invalid user nagesh from 171.254.159.49
Mar 12 05:54:43 ncomp sshd[8686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.254.159.49
Mar 12 05:54:40 ncomp sshd[8686]: Invalid user nagesh from 171.254.159.49
Mar 12 05:54:46 ncomp sshd[8686]: Failed password for invalid user nagesh from 171.254.159.49 port 12739 ssh2
2020-03-12 13:55:14
106.51.98.159 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-12 13:46:22
157.50.19.204 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 03:55:08.
2020-03-12 13:39:35
221.144.61.3 attackspam
...
2020-03-12 13:42:52
49.233.192.233 attackbotsspam
Mar 12 06:03:42 legacy sshd[26154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.192.233
Mar 12 06:03:44 legacy sshd[26154]: Failed password for invalid user passw0rd0 from 49.233.192.233 port 33716 ssh2
Mar 12 06:07:36 legacy sshd[26256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.192.233
...
2020-03-12 13:48:18
122.155.223.58 attackspam
21 attempts against mh-ssh on cloud
2020-03-12 13:45:11
58.215.215.134 attack
...
2020-03-12 13:50:40
222.186.173.226 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Failed password for root from 222.186.173.226 port 16140 ssh2
Failed password for root from 222.186.173.226 port 16140 ssh2
Failed password for root from 222.186.173.226 port 16140 ssh2
Failed password for root from 222.186.173.226 port 16140 ssh2
2020-03-12 14:06:23
212.64.67.116 attackbots
2020-03-12 04:54:39,133 fail2ban.actions: WARNING [ssh] Ban 212.64.67.116
2020-03-12 14:00:37
89.163.132.37 attack
SSH Brute Force
2020-03-12 13:57:29

Recently Reported IPs

195.22.8.67 98.58.40.156 137.148.217.199 119.214.46.25
89.4.67.197 242.117.132.165 213.29.11.141 67.150.208.204
247.21.26.229 250.182.76.23 133.149.147.80 185.120.67.162
8.66.130.204 235.221.92.123 180.130.96.231 35.192.13.70
67.37.190.46 59.168.139.126 93.212.116.68 73.197.112.56