Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.201.5.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.201.5.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 23:03:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 11.5.201.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.5.201.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.108.87.133 attackbotsspam
Unauthorized connection attempt detected from IP address 103.108.87.133 to port 2220 [J]
2020-01-18 04:41:06
107.135.147.127 attack
Jan 17 20:45:16 MK-Soft-VM8 sshd[28637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.135.147.127 
Jan 17 20:45:18 MK-Soft-VM8 sshd[28637]: Failed password for invalid user wine from 107.135.147.127 port 51962 ssh2
...
2020-01-18 04:39:49
192.182.124.9 attackbots
Invalid user vi from 192.182.124.9 port 36846
2020-01-18 04:21:06
103.35.64.73 attackbots
Unauthorized connection attempt detected from IP address 103.35.64.73 to port 2220 [J]
2020-01-18 04:41:52
179.233.22.90 attackspam
Invalid user ttf from 179.233.22.90 port 53932
2020-01-18 04:24:06
37.192.170.184 attackspambots
Invalid user admin from 37.192.170.184 port 44848
2020-01-18 04:46:40
202.137.134.40 attack
Invalid user admin from 202.137.134.40 port 57827
2020-01-18 04:54:31
178.121.188.4 attackbots
Invalid user admin from 178.121.188.4 port 47305
2020-01-18 04:25:07
164.132.80.139 attackspambots
Jan 17 19:16:33 ns382633 sshd\[27008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139  user=root
Jan 17 19:16:36 ns382633 sshd\[27008\]: Failed password for root from 164.132.80.139 port 38592 ssh2
Jan 17 19:25:10 ns382633 sshd\[28633\]: Invalid user sftp from 164.132.80.139 port 35608
Jan 17 19:25:10 ns382633 sshd\[28633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Jan 17 19:25:12 ns382633 sshd\[28633\]: Failed password for invalid user sftp from 164.132.80.139 port 35608 ssh2
2020-01-18 04:27:21
123.20.229.142 attackbotsspam
Invalid user admin from 123.20.229.142 port 45507
2020-01-18 04:34:17
134.209.63.140 attackbots
Unauthorized connection attempt detected from IP address 134.209.63.140 to port 2220 [J]
2020-01-18 04:32:57
118.98.121.194 attackspam
Unauthorized connection attempt detected from IP address 118.98.121.194 to port 2220 [J]
2020-01-18 04:35:28
197.47.12.154 attack
Invalid user admin from 197.47.12.154 port 50399
2020-01-18 04:56:25
142.93.172.64 attack
[ssh] SSH attack
2020-01-18 04:30:24
14.207.41.9 attackspam
Invalid user admin from 14.207.41.9 port 51850
2020-01-18 04:48:57

Recently Reported IPs

51.2.76.193 114.149.12.133 64.82.203.39 81.27.19.241
134.22.210.225 77.123.103.125 97.184.123.217 107.167.90.92
195.108.230.101 227.132.59.254 131.140.44.16 52.37.182.98
101.60.136.248 87.134.198.60 179.237.179.225 176.165.167.178
168.88.121.205 215.95.71.249 140.64.36.109 44.58.65.67