Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.114.225.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.114.225.134.		IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 01:47:49 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.225.114.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.225.114.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
205.185.123.139 attackbots
[portscan] tcp/22 [SSH]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(05280955)
2020-05-28 15:29:51
222.186.175.154 attackbots
May 28 09:58:15 prod4 sshd\[7629\]: Failed password for root from 222.186.175.154 port 19220 ssh2
May 28 09:58:19 prod4 sshd\[7629\]: Failed password for root from 222.186.175.154 port 19220 ssh2
May 28 09:58:22 prod4 sshd\[7629\]: Failed password for root from 222.186.175.154 port 19220 ssh2
...
2020-05-28 16:00:24
180.76.121.28 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-28 15:51:20
210.74.11.97 attackspam
SSH login attempts.
2020-05-28 15:36:34
121.241.244.92 attackspambots
May 28 09:05:18 hosting sshd[7612]: Invalid user hatti from 121.241.244.92 port 59328
...
2020-05-28 15:56:33
103.78.209.204 attackspambots
3x Failed Password
2020-05-28 16:05:31
202.147.198.154 attackspambots
Invalid user saumya from 202.147.198.154 port 51123
2020-05-28 15:47:00
222.160.218.207 attackspam
SSH login attempts.
2020-05-28 15:46:17
140.246.155.37 attack
SSH login attempts.
2020-05-28 15:33:30
106.12.55.87 attackspambots
Invalid user coremail from 106.12.55.87 port 49794
2020-05-28 16:05:15
200.89.159.190 attackspambots
SSH login attempts.
2020-05-28 15:34:05
180.109.36.172 attack
2020-05-27T21:55:29.986880linuxbox-skyline sshd[108223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.109.36.172  user=root
2020-05-27T21:55:31.811949linuxbox-skyline sshd[108223]: Failed password for root from 180.109.36.172 port 35220 ssh2
...
2020-05-28 15:30:38
151.80.83.249 attack
bruteforce detected
2020-05-28 15:52:45
213.230.75.160 attack
IP 213.230.75.160 attacked honeypot on port: 8080 at 5/28/2020 4:55:11 AM
2020-05-28 15:50:46
140.143.134.86 attack
SSH Bruteforce attack
2020-05-28 15:31:21

Recently Reported IPs

251.249.243.242 174.152.167.11 226.226.160.148 60.206.149.68
134.109.160.235 198.179.141.199 238.74.242.36 174.131.197.146
226.248.152.225 37.148.112.124 142.42.64.72 146.156.73.63
17.211.235.129 149.150.148.99 136.192.174.208 52.130.21.68
168.5.165.216 123.229.171.230 51.2.132.241 209.133.32.108