Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hwaseong-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: SK Broadband Co Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.127.149.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20749
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.127.149.6.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 15 03:43:33 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 6.149.127.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 6.149.127.116.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
186.122.147.189 attackspambots
Nov 25 11:12:59 ny01 sshd[16063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.147.189
Nov 25 11:13:01 ny01 sshd[16063]: Failed password for invalid user biswa from 186.122.147.189 port 49898 ssh2
Nov 25 11:21:33 ny01 sshd[16812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.147.189
2019-11-26 00:36:44
40.124.4.131 attackbots
2019-11-25T16:17:52.902493abusebot-7.cloudsearch.cf sshd\[17573\]: Invalid user wp-user from 40.124.4.131 port 55488
2019-11-26 00:55:24
121.142.165.111 attack
Nov 25 09:38:48 ny01 sshd[6001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.165.111
Nov 25 09:38:50 ny01 sshd[6001]: Failed password for invalid user admin from 121.142.165.111 port 37470 ssh2
Nov 25 09:38:53 ny01 sshd[6001]: Failed password for invalid user admin from 121.142.165.111 port 37470 ssh2
Nov 25 09:38:55 ny01 sshd[6001]: Failed password for invalid user admin from 121.142.165.111 port 37470 ssh2
2019-11-26 00:45:11
81.218.146.213 attackbotsspam
81.218.146.213 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-26 00:16:36
138.68.30.2 attack
Automatic report - Banned IP Access
2019-11-26 00:59:16
195.201.129.241 attackspambots
detected by Fail2Ban
2019-11-26 01:01:27
222.186.175.167 attackbots
Nov 25 17:12:09 dedicated sshd[4327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Nov 25 17:12:11 dedicated sshd[4327]: Failed password for root from 222.186.175.167 port 28616 ssh2
2019-11-26 00:15:38
112.85.42.179 attack
Nov 25 17:44:15 localhost sshd\[21681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.179  user=root
Nov 25 17:44:17 localhost sshd\[21681\]: Failed password for root from 112.85.42.179 port 22616 ssh2
Nov 25 17:44:22 localhost sshd\[21681\]: Failed password for root from 112.85.42.179 port 22616 ssh2
2019-11-26 00:56:41
178.88.115.126 attack
Nov 25 16:59:55 ns41 sshd[26443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.115.126
2019-11-26 00:55:00
141.98.81.117 attack
Nov 25 11:52:35 TORMINT sshd\[22893\]: Invalid user admin from 141.98.81.117
Nov 25 11:52:35 TORMINT sshd\[22893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.117
Nov 25 11:52:37 TORMINT sshd\[22893\]: Failed password for invalid user admin from 141.98.81.117 port 38819 ssh2
...
2019-11-26 00:59:30
111.68.104.156 attack
Nov 25 16:41:39 MK-Soft-VM7 sshd[3660]: Failed password for news from 111.68.104.156 port 14098 ssh2
...
2019-11-26 00:51:10
222.186.180.41 attackbots
Nov 22 14:51:49 microserver sshd[28955]: Failed none for root from 222.186.180.41 port 12110 ssh2
Nov 22 14:51:49 microserver sshd[28955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Nov 22 14:51:51 microserver sshd[28955]: Failed password for root from 222.186.180.41 port 12110 ssh2
Nov 22 14:51:54 microserver sshd[28955]: Failed password for root from 222.186.180.41 port 12110 ssh2
Nov 22 14:51:58 microserver sshd[28955]: Failed password for root from 222.186.180.41 port 12110 ssh2
Nov 23 10:21:23 microserver sshd[58425]: Failed none for root from 222.186.180.41 port 61496 ssh2
Nov 23 10:21:24 microserver sshd[58425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Nov 23 10:21:25 microserver sshd[58425]: Failed password for root from 222.186.180.41 port 61496 ssh2
Nov 23 10:21:29 microserver sshd[58425]: Failed password for root from 222.186.180.41 port 61496 ssh2
Nov 23 1
2019-11-26 00:46:38
180.168.37.250 attack
Port 3389 Scan
2019-11-26 00:40:43
95.70.114.55 attackspambots
Brute force attempt
2019-11-26 00:49:05
104.200.132.239 attackbotsspam
104.200.132.239 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-26 00:41:12

Recently Reported IPs

154.65.94.56 94.102.51.196 185.244.22.253 159.203.179.191
178.203.119.130 124.43.17.169 198.62.202.35 34.73.185.218
23.97.177.82 35.199.154.128 128.91.208.83 125.227.57.223
211.224.176.148 123.135.156.48 41.46.63.119 89.107.136.118
185.63.152.205 190.139.50.106 219.154.17.126 154.0.6.2