Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea, Republic of

Internet Service Provider: Room 413 No.188 Dong Han Men Nan Lu

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/116.193.154.149/ 
 
 KR - 1H : (54)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN138195 
 
 IP : 116.193.154.149 
 
 CIDR : 116.193.154.0/24 
 
 PREFIX COUNT : 23 
 
 UNIQUE IP COUNT : 5888 
 
 
 ATTACKS DETECTED ASN138195 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-24 22:12:09 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-25 07:42:03
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.193.154.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.193.154.149.		IN	A

;; AUTHORITY SECTION:
.			393	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102401 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 25 07:41:58 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 149.154.193.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 149.154.193.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
149.202.75.164 attack
Bad bot/spoofed identity
2020-02-14 10:12:20
219.138.59.240 attackbotsspam
failed_logins
2020-02-14 10:03:48
193.112.104.178 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 09:53:05
193.105.126.230 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 09:54:05
142.93.207.14 attack
Feb 13 23:02:44 pi sshd[28431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.207.14  user=root
Feb 13 23:02:46 pi sshd[28431]: Failed password for invalid user root from 142.93.207.14 port 47466 ssh2
2020-02-14 09:54:57
117.119.86.144 attack
Invalid user tna from 117.119.86.144 port 35076
2020-02-14 10:22:40
191.36.189.140 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 10:11:38
51.77.140.36 attackspambots
Invalid user support2 from 51.77.140.36 port 46472
2020-02-14 10:09:01
191.36.185.119 attackbotsspam
23/tcp
[2020-02-13]1pkt
2020-02-14 10:14:40
45.148.10.171 attackspambots
Invalid user oracle from 45.148.10.171 port 42404
2020-02-14 10:18:11
85.93.20.34 attackbotsspam
20 attempts against mh-misbehave-ban on tree
2020-02-14 10:25:36
2.38.186.191 attackspam
Automatic report - Banned IP Access
2020-02-14 10:10:36
206.189.156.198 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-02-14 09:58:25
51.91.212.81 attack
02/14/2020-02:52:12.781947 51.91.212.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 53
2020-02-14 10:01:35
191.35.186.35 attackspambots
Automatic report - Port Scan Attack
2020-02-14 10:16:34

Recently Reported IPs

118.123.245.241 47.94.239.48 43.254.44.160 106.3.143.235
52.83.255.255 139.59.12.109 68.194.196.82 35.240.248.225
31.163.236.193 213.205.198.156 200.19.156.22 192.34.63.180
103.14.100.184 125.64.43.159 117.34.17.184 95.24.63.207
192.168.31.250 176.100.113.83 185.220.101.74 42.118.71.116