Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.149.131.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;119.149.131.126.		IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040501 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 06 07:05:01 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 126.131.149.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.131.149.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
27.3.8.147 attackbotsspam
Unauthorized connection attempt from IP address 27.3.8.147 on Port 445(SMB)
2019-11-03 21:05:38
123.207.40.70 attackbots
frenzy
2019-11-03 20:36:41
103.26.40.143 attackbots
2019-11-03T09:01:41.864147abusebot-7.cloudsearch.cf sshd\[2831\]: Invalid user susanne from 103.26.40.143 port 47688
2019-11-03 20:33:29
185.9.3.48 attack
Nov  3 13:22:23 dedicated sshd[5359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.9.3.48  user=root
Nov  3 13:22:25 dedicated sshd[5359]: Failed password for root from 185.9.3.48 port 34456 ssh2
Nov  3 13:26:23 dedicated sshd[6070]: Invalid user wg from 185.9.3.48 port 45074
Nov  3 13:26:23 dedicated sshd[6070]: Invalid user wg from 185.9.3.48 port 45074
2019-11-03 20:31:29
60.220.230.21 attack
Nov  3 04:13:35 ny01 sshd[17560]: Failed password for root from 60.220.230.21 port 49541 ssh2
Nov  3 04:18:33 ny01 sshd[18041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21
Nov  3 04:18:35 ny01 sshd[18041]: Failed password for invalid user anna from 60.220.230.21 port 39546 ssh2
2019-11-03 20:39:26
191.234.53.216 attackbots
RDP Bruteforce
2019-11-03 20:37:35
222.242.223.75 attack
Nov  3 05:13:10 microserver sshd[48099]: Invalid user students from 222.242.223.75 port 29793
Nov  3 05:13:10 microserver sshd[48099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.223.75
Nov  3 05:13:12 microserver sshd[48099]: Failed password for invalid user students from 222.242.223.75 port 29793 ssh2
Nov  3 05:18:50 microserver sshd[48807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.223.75  user=root
Nov  3 05:18:52 microserver sshd[48807]: Failed password for root from 222.242.223.75 port 30049 ssh2
Nov  3 05:42:24 microserver sshd[52016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.223.75  user=root
Nov  3 05:42:26 microserver sshd[52016]: Failed password for root from 222.242.223.75 port 30977 ssh2
Nov  3 05:48:18 microserver sshd[52713]: Invalid user pi from 222.242.223.75 port 31425
Nov  3 05:48:18 microserver sshd[52713]: pam_unix(sshd:auth): aut
2019-11-03 20:52:43
124.16.164.2 attack
Nov  3 01:53:16 mockhub sshd[20713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.164.2
Nov  3 01:53:18 mockhub sshd[20713]: Failed password for invalid user user from 124.16.164.2 port 40337 ssh2
...
2019-11-03 20:33:14
112.30.185.8 attack
Nov  3 13:34:07 piServer sshd[4255]: Failed password for root from 112.30.185.8 port 52379 ssh2
Nov  3 13:38:20 piServer sshd[4579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.30.185.8
Nov  3 13:38:22 piServer sshd[4579]: Failed password for invalid user jl from 112.30.185.8 port 37488 ssh2
...
2019-11-03 20:48:50
207.232.28.81 attackspam
Unauthorised access (Nov  3) SRC=207.232.28.81 LEN=44 PREC=0xC0 TTL=53 ID=54909 TCP DPT=8080 WINDOW=12363 SYN
2019-11-03 20:38:13
120.50.13.216 attackspam
Nov  3 08:24:57 vps691689 sshd[30592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.50.13.216
Nov  3 08:24:59 vps691689 sshd[30592]: Failed password for invalid user telsoft from 120.50.13.216 port 60525 ssh2
...
2019-11-03 21:03:11
212.72.182.212 attack
WordPress wp-login brute force :: 212.72.182.212 0.088 BYPASS [03/Nov/2019:08:05:12  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1525 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-03 20:42:49
77.42.117.168 attackspambots
Automatic report - Port Scan Attack
2019-11-03 21:07:54
145.239.210.220 attackspambots
Nov  3 09:31:41 ms-srv sshd[64713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.210.220  user=root
Nov  3 09:31:43 ms-srv sshd[64713]: Failed password for invalid user root from 145.239.210.220 port 58066 ssh2
2019-11-03 20:59:40
51.38.224.110 attackbots
Nov  3 12:41:36 icinga sshd[9609]: Failed password for root from 51.38.224.110 port 59730 ssh2
...
2019-11-03 20:55:37

Recently Reported IPs

157.237.152.82 179.35.209.1 187.1.227.194 98.184.131.68
123.130.91.76 68.201.139.168 212.128.95.205 221.39.55.254
176.34.159.186 117.137.221.33 87.187.104.63 58.68.122.141
107.171.171.152 220.107.81.14 143.189.84.129 189.171.149.22
122.88.161.0 179.108.101.100 35.133.35.120 210.73.113.39