Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yeongdeungpo-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.205.157.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.205.157.12.			IN	A

;; AUTHORITY SECTION:
.			171	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 28 21:16:34 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 12.157.205.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.157.205.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.221.105.7 attackbotsspam
Unauthorized connection attempt detected from IP address 82.221.105.7 to port 4443
2020-01-15 00:27:52
114.113.157.32 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-15 00:37:37
119.236.46.245 attackspam
Fail2Ban Ban Triggered
2020-01-15 00:34:32
113.161.89.170 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-15 00:52:26
113.22.43.25 attackbotsspam
Unauthorized connection attempt detected from IP address 113.22.43.25 to port 23 [J]
2020-01-15 00:50:44
117.220.198.187 attack
Brute forcing RDP port 3389
2020-01-15 00:18:48
222.186.173.215 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Failed password for root from 222.186.173.215 port 11562 ssh2
Failed password for root from 222.186.173.215 port 11562 ssh2
Failed password for root from 222.186.173.215 port 11562 ssh2
Failed password for root from 222.186.173.215 port 11562 ssh2
2020-01-15 00:49:07
65.49.20.71 attack
1579006888 - 01/14/2020 14:01:28 Host: 65.49.20.71/65.49.20.71 Port: 443 UDP Blocked
2020-01-15 00:47:03
94.207.41.237 attackbots
ICMP MH Probe, Scan /Distributed -
2020-01-15 00:25:49
196.219.229.178 attackbotsspam
Unauthorized connection attempt from IP address 196.219.229.178 on Port 445(SMB)
2020-01-15 00:23:10
107.167.17.66 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: mx.industrek.com.
2020-01-15 00:38:10
46.8.252.170 attackbots
Unauthorized connection attempt from IP address 46.8.252.170 on Port 445(SMB)
2020-01-15 00:28:12
92.154.88.157 attackspambots
firewall-block, port(s): 1433/tcp
2020-01-15 00:56:57
81.30.51.54 attack
Unauthorized connection attempt detected from IP address 81.30.51.54 to port 445
2020-01-15 00:35:34
186.219.217.188 attackspam
Unauthorized connection attempt from IP address 186.219.217.188 on Port 445(SMB)
2020-01-15 00:30:37

Recently Reported IPs

149.133.153.159 56.221.65.208 20.190.149.239 16.69.164.171
157.177.243.140 218.87.39.44 171.234.244.10 109.45.215.38
167.172.79.229 243.158.56.111 32.150.35.33 221.97.18.147
100.138.167.246 183.224.141.61 135.18.154.248 32.31.155.101
22.132.37.246 212.133.16.177 186.107.22.190 164.107.61.79