Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Busan

Region: Busan

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: SK Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.39.149.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39533
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;223.39.149.106.			IN	A

;; AUTHORITY SECTION:
.			2770	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040402 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 05 09:52:46 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 106.149.39.223.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 106.149.39.223.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
60.199.131.62 attackspam
Aug 6 21:52:20 *hidden* sshd[34069]: Failed password for *hidden* from 60.199.131.62 port 53856 ssh2 Aug 6 21:56:47 *hidden* sshd[34614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.199.131.62 user=root Aug 6 21:56:49 *hidden* sshd[34614]: Failed password for *hidden* from 60.199.131.62 port 36934 ssh2
2020-08-07 04:09:05
140.255.47.106 attack
14:18:32.317 1 ACCOUNT(james) login(SMTP) from [140.255.47.106] failed. Error Code=incorrect password
14:18:56.289 1 ACCOUNT(james) login(SMTP) from [140.255.47.106] failed. Error Code=incorrect password
...
2020-08-07 04:31:13
218.7.116.106 attack
spam (f2b h2)
2020-08-07 04:26:26
144.217.95.97 attackspambots
Aug  6 16:58:50 fhem-rasp sshd[511]: Failed password for root from 144.217.95.97 port 36944 ssh2
Aug  6 16:58:51 fhem-rasp sshd[511]: Disconnected from authenticating user root 144.217.95.97 port 36944 [preauth]
...
2020-08-07 04:41:48
58.40.133.54 attack
Unauthorised access (Aug  6) SRC=58.40.133.54 LEN=40 TTL=240 ID=31529 TCP DPT=1433 WINDOW=1024 SYN
2020-08-07 04:24:35
45.164.8.244 attack
2020-08-06T20:14:38.075642hostname sshd[11474]: Failed password for root from 45.164.8.244 port 45988 ssh2
2020-08-06T20:18:57.288392hostname sshd[13179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.164.8.244  user=root
2020-08-06T20:18:59.432660hostname sshd[13179]: Failed password for root from 45.164.8.244 port 50622 ssh2
...
2020-08-07 04:32:16
188.165.230.118 attackbotsspam
188.165.230.118 - - [06/Aug/2020:21:22:16 +0100] "POST /wp-login.php HTTP/1.1" 200 5940 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [06/Aug/2020:21:24:35 +0100] "POST /wp-login.php HTTP/1.1" 200 5940 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.230.118 - - [06/Aug/2020:21:26:56 +0100] "POST /wp-login.php HTTP/1.1" 200 5947 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-07 04:36:08
111.230.175.183 attackbots
2020-08-06T18:42:13.478064amanda2.illicoweb.com sshd\[11420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.175.183  user=root
2020-08-06T18:42:14.912074amanda2.illicoweb.com sshd\[11420\]: Failed password for root from 111.230.175.183 port 54128 ssh2
2020-08-06T18:45:15.038064amanda2.illicoweb.com sshd\[12335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.175.183  user=root
2020-08-06T18:45:17.460215amanda2.illicoweb.com sshd\[12335\]: Failed password for root from 111.230.175.183 port 41232 ssh2
2020-08-06T18:51:19.977207amanda2.illicoweb.com sshd\[13991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.175.183  user=root
...
2020-08-07 04:18:26
128.106.72.17 attackspambots
Hits on port : 8000
2020-08-07 04:30:20
110.88.31.165 attackspambots
MAIL: User Login Brute Force Attempt
2020-08-07 04:16:27
45.224.42.249 attack
Automatic report - Port Scan Attack
2020-08-07 04:29:14
159.203.105.90 attackbotsspam
159.203.105.90 - - [06/Aug/2020:14:19:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.105.90 - - [06/Aug/2020:14:19:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2020 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.105.90 - - [06/Aug/2020:14:19:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2019 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 04:20:32
176.43.128.13 attackbots
Port probing on unauthorized port 995
2020-08-07 04:10:39
185.166.87.233 attackbotsspam
0,53-00/00 [bc00/m30] PostRequest-Spammer scoring: brussels
2020-08-07 04:19:16
8.210.7.25 attackbots
[portscan] Port scan
2020-08-07 04:17:59

Recently Reported IPs

187.123.107.42 52.83.214.230 88.218.94.132 170.254.52.176
106.12.125.139 187.188.173.107 85.28.83.23 177.191.177.70
117.173.87.132 187.127.72.218 154.70.200.122 142.4.223.187
138.197.27.229 118.24.250.245 109.92.223.46 92.63.197.158
66.42.48.30 223.75.104.191 51.254.218.28 162.243.147.46