Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gwangju

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.211.98.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39072
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;182.211.98.149.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122402 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 04:34:03 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 149.98.211.182.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.98.211.182.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.196.57.128 attack
Invalid user utnubu123 from 151.196.57.128 port 54455
2020-04-30 00:09:13
101.51.207.18 attackspambots
Unauthorized connection attempt from IP address 101.51.207.18 on Port 445(SMB)
2020-04-30 00:22:27
175.139.191.169 attackspam
Failed password for root from 175.139.191.169 port 60876 ssh2
2020-04-30 00:06:43
106.13.239.120 attack
Failed password for root from 106.13.239.120 port 50810 ssh2
2020-04-30 00:20:07
140.143.143.200 attackspambots
Failed password for root from 140.143.143.200 port 43242 ssh2
2020-04-29 23:39:01
134.209.90.139 attackbotsspam
2020-04-29T14:41:10.114505  sshd[27565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.139
2020-04-29T14:41:10.099271  sshd[27565]: Invalid user ym from 134.209.90.139 port 32900
2020-04-29T14:41:12.397459  sshd[27565]: Failed password for invalid user ym from 134.209.90.139 port 32900 ssh2
2020-04-29T16:44:30.633779  sshd[29570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.139  user=root
2020-04-29T16:44:32.805778  sshd[29570]: Failed password for root from 134.209.90.139 port 41202 ssh2
...
2020-04-29 23:41:01
106.12.57.165 attackbotsspam
2020-04-29T14:59:16.786870abusebot-4.cloudsearch.cf sshd[2548]: Invalid user tom from 106.12.57.165 port 35916
2020-04-29T14:59:16.793952abusebot-4.cloudsearch.cf sshd[2548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.165
2020-04-29T14:59:16.786870abusebot-4.cloudsearch.cf sshd[2548]: Invalid user tom from 106.12.57.165 port 35916
2020-04-29T14:59:18.930542abusebot-4.cloudsearch.cf sshd[2548]: Failed password for invalid user tom from 106.12.57.165 port 35916 ssh2
2020-04-29T15:04:14.099586abusebot-4.cloudsearch.cf sshd[2897]: Invalid user hyang from 106.12.57.165 port 58458
2020-04-29T15:04:14.106750abusebot-4.cloudsearch.cf sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.57.165
2020-04-29T15:04:14.099586abusebot-4.cloudsearch.cf sshd[2897]: Invalid user hyang from 106.12.57.165 port 58458
2020-04-29T15:04:16.152975abusebot-4.cloudsearch.cf sshd[2897]: Failed password for 
...
2020-04-30 00:21:01
111.229.25.191 attackspambots
Failed password for root from 111.229.25.191 port 41892 ssh2
2020-04-29 23:45:21
123.24.147.208 attack
Guy tried to steal my minecraft account lmao
2020-04-29 23:54:30
101.124.70.81 attack
Brute-force attempt banned
2020-04-30 00:21:56
47.17.177.110 attack
Invalid user mmmmm from 47.17.177.110 port 44728
2020-04-29 23:54:35
122.51.178.207 attack
Invalid user oracle from 122.51.178.207 port 54946
2020-04-30 00:15:34
69.229.6.32 attack
Failed password for root from 69.229.6.32 port 46274 ssh2
2020-04-29 23:52:19
192.144.172.50 attackspam
Invalid user apache from 192.144.172.50 port 50742
2020-04-30 00:03:00
76.31.3.238 attackbotsspam
Failed password for root from 76.31.3.238 port 42942 ssh2
2020-04-29 23:51:48

Recently Reported IPs

142.44.162.120 44.216.110.220 61.140.206.175 190.7.134.242
222.220.127.207 217.24.74.118 163.10.12.128 5.16.124.102
210.83.205.232 94.147.86.87 217.122.176.243 12.22.10.11
83.87.146.98 77.190.54.194 190.111.240.218 149.161.215.16
166.122.98.181 60.191.209.230 106.73.33.140 91.220.38.33