Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seocho-gu

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.52.34.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.52.34.129.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100501 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 06 02:19:24 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 129.34.52.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.34.52.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.96.189.186 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 03:26:45,227 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.96.189.186)
2019-06-27 15:05:20
187.12.167.85 attackspam
Jun 27 12:44:07 localhost sshd[31263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.167.85  user=backup
Jun 27 12:44:09 localhost sshd[31263]: Failed password for backup from 187.12.167.85 port 53266 ssh2
Jun 27 12:47:35 localhost sshd[31321]: Invalid user admin from 187.12.167.85 port 57426
...
2019-06-27 15:20:01
130.61.83.71 attackbotsspam
Tried sshing with brute force.
2019-06-27 14:58:30
14.37.38.213 attack
frenzy
2019-06-27 14:50:03
191.53.221.114 attackbotsspam
libpam_shield report: forced login attempt
2019-06-27 15:29:15
104.248.122.33 attackbots
Invalid user z from 104.248.122.33 port 33408
2019-06-27 15:17:41
113.161.198.128 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 04:09:48,153 INFO [shellcode_manager] (113.161.198.128) no match, writing hexdump (881fac3f9a39d2c8916b9893a34b07b5 :2128263) - MS17010 (EternalBlue)
2019-06-27 15:23:19
46.3.96.71 attackbotsspam
27.06.2019 07:15:53 Connection to port 47047 blocked by firewall
2019-06-27 15:45:56
139.59.247.114 attack
$f2bV_matches
2019-06-27 15:30:41
182.78.151.150 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 03:12:46,086 INFO [shellcode_manager] (182.78.151.150) no match, writing hexdump (924b1a24e3a02ddb26f419c85ee131c1 :2118681) - MS17010 (EternalBlue)
2019-06-27 15:21:58
37.49.227.12 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2019-06-27 15:47:58
205.209.174.206 attackbots
3389BruteforceFW23
2019-06-27 14:50:27
81.28.107.117 spam
Spammer
2019-06-27 15:08:21
139.59.84.55 attackbots
Jun 27 08:59:48 OPSO sshd\[2983\]: Invalid user user3 from 139.59.84.55 port 44058
Jun 27 08:59:48 OPSO sshd\[2983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.55
Jun 27 08:59:51 OPSO sshd\[2983\]: Failed password for invalid user user3 from 139.59.84.55 port 44058 ssh2
Jun 27 09:02:57 OPSO sshd\[3402\]: Invalid user cv from 139.59.84.55 port 46816
Jun 27 09:02:57 OPSO sshd\[3402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.55
2019-06-27 15:06:38
51.89.7.92 attackbots
SIPVicious Scanner Detection
2019-06-27 15:45:25

Recently Reported IPs

108.218.90.230 114.25.113.80 83.237.96.26 172.94.92.27
123.75.233.126 211.58.237.186 107.178.236.7 8.45.105.187
191.162.202.39 174.245.112.204 115.135.171.27 218.149.228.175
64.203.249.56 68.90.28.153 163.6.1.71 95.205.253.39
2.182.188.10 60.75.30.3 51.104.180.146 31.47.175.9