Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.202.129.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.202.129.189.		IN	A

;; AUTHORITY SECTION:
.			231	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 16:31:29 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 189.129.202.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.129.202.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.250.229.115 attackspam
SSH Invalid Login
2020-10-01 06:57:41
94.102.56.238 attackspam
scans once in preceeding hours on the ports (in chronological order) 5900 resulting in total of 44 scans from 94.102.48.0/20 block.
2020-10-01 06:44:49
119.187.120.38 attack
Listed on    zen-spamhaus   / proto=6  .  srcport=54697  .  dstport=1433  .     (2089)
2020-10-01 06:39:17
103.82.24.179 attack
Invalid user testftp from 103.82.24.179 port 60624
2020-10-01 06:31:12
102.165.30.41 attackspambots
firewall-block, port(s): 3493/tcp
2020-10-01 06:43:03
192.241.175.250 attackbots
Sep 30 22:11:30 buvik sshd[27590]: Failed password for invalid user steve from 192.241.175.250 port 37767 ssh2
Sep 30 22:20:20 buvik sshd[28697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.250  user=root
Sep 30 22:20:21 buvik sshd[28697]: Failed password for root from 192.241.175.250 port 42467 ssh2
...
2020-10-01 06:31:29
120.42.132.232 attackspambots
Brute forcing email accounts
2020-10-01 07:05:30
185.193.90.166 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:02:50
173.245.52.206 attack
CMS (WordPress or Joomla) login attempt.
2020-10-01 06:34:39
148.70.31.188 attackspam
SSH Invalid Login
2020-10-01 06:32:16
80.82.77.33 attackbotsspam
scans once in preceeding hours on the ports (in chronological order) 3689 resulting in total of 275 scans from 80.82.64.0/20 block.
2020-10-01 06:49:58
167.248.133.29 attackspam
 TCP (SYN) 167.248.133.29:64517 -> port 2222, len 44
2020-10-01 06:37:52
45.129.33.40 attackspambots
scans 12 times in preceeding hours on the ports (in chronological order) 30476 30274 30135 30070 30262 30332 30301 30252 30066 30448 30159 30023 resulting in total of 113 scans from 45.129.33.0/24 block.
2020-10-01 06:55:34
104.255.10.92 attack
firewall-block, port(s): 445/tcp
2020-10-01 07:07:01
116.177.248.202 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 124
2020-10-01 07:05:44

Recently Reported IPs

71.85.224.67 59.95.65.199 187.167.197.151 110.232.253.67
93.183.214.217 27.7.53.132 20.104.233.5 165.231.24.228
164.90.226.25 139.59.7.206 120.157.25.57 120.86.237.228
36.142.142.245 42.230.99.248 112.32.12.32 107.175.28.93
106.13.12.219 185.154.129.53 27.5.42.120 171.34.178.176