Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.141.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;123.141.245.149.		IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092201 1800 900 604800 86400

;; Query time: 332 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 23 12:52:37 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 149.245.141.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.245.141.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.71.167.171 attackspambots
Unauthorized connection attempt detected from IP address 223.71.167.171 to port 80
2020-05-31 20:50:39
138.204.156.112 attackbots
Unauthorized connection attempt detected from IP address 138.204.156.112 to port 23
2020-05-31 20:59:21
223.71.167.164 attackspam
scans 10 times in preceeding hours on the ports (in chronological order) 9306 9999 14000 8161 1911 8088 49151 2002 10005 1200 resulting in total of 10 scans from 223.64.0.0/11 block.
2020-05-31 21:25:41
116.136.19.139 attack
Unauthorized connection attempt detected from IP address 116.136.19.139 to port 222
2020-05-31 21:02:30
108.41.185.191 attackspam
Unauthorized connection attempt detected from IP address 108.41.185.191 to port 23
2020-05-31 21:05:23
45.178.16.193 attackspam
Unauthorized connection attempt detected from IP address 45.178.16.193 to port 23
2020-05-31 21:18:24
197.214.112.126 attack
Unauthorized connection attempt detected from IP address 197.214.112.126 to port 23
2020-05-31 21:28:31
219.144.217.46 attack
Unauthorized connection attempt detected from IP address 219.144.217.46 to port 445
2020-05-31 20:52:10
222.186.190.14 attackbots
May 31 15:24:16 PorscheCustomer sshd[8646]: Failed password for root from 222.186.190.14 port 42644 ssh2
May 31 15:24:25 PorscheCustomer sshd[8650]: Failed password for root from 222.186.190.14 port 37422 ssh2
...
2020-05-31 21:26:35
66.42.4.100 attackbotsspam
Unauthorized connection attempt detected from IP address 66.42.4.100 to port 23
2020-05-31 21:14:41
94.124.96.133 attackbots
Unauthorized connection attempt detected from IP address 94.124.96.133 to port 8000
2020-05-31 21:07:11
37.142.118.213 attackspambots
Unauthorized connection attempt detected from IP address 37.142.118.213 to port 23
2020-05-31 21:21:50
123.10.91.144 attack
Unauthorized connection attempt detected from IP address 123.10.91.144 to port 23
2020-05-31 21:00:37
191.100.9.172 attack
Unauthorized connection attempt detected from IP address 191.100.9.172 to port 2004
2020-05-31 21:29:56
45.136.108.67 attackspambots
Unauthorized connection attempt detected from IP address 45.136.108.67 to port 3686
2020-05-31 21:19:38

Recently Reported IPs

119.167.40.240 37.117.29.8 222.186.175.155 252.114.39.5
223.71.106.93 99.119.12.101 251.93.130.191 80.109.241.65
238.244.193.8 66.69.243.219 107.112.196.92 72.240.107.189
71.87.152.244 0.193.144.103 214.159.130.166 73.236.145.111
206.204.138.135 12.22.93.108 252.135.144.74 80.10.60.21