Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Gyeongbuk Cable TV

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.143.12.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53929
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.143.12.223.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 01:13:16 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 223.12.143.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 223.12.143.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.124.9.176 attackspambots
Unauthorized connection attempt from IP address 59.124.9.176 on Port 445(SMB)
2020-01-17 23:57:05
91.185.216.4 attackbots
Port 1433 Scan
2020-01-17 23:45:41
185.234.217.66 attackbots
Brute force attempt
2020-01-17 23:31:56
103.73.102.106 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-01-17 23:24:54
37.49.231.105 attackspambots
Fail2Ban Ban Triggered
2020-01-17 23:49:49
158.174.245.170 attackspam
SSH/22 MH Probe, BF, Hack -
2020-01-17 23:50:08
49.145.238.220 attack
Unauthorized connection attempt from IP address 49.145.238.220 on Port 445(SMB)
2020-01-17 23:29:35
51.15.9.27 attackspambots
Jan 17 14:02:04 wordpress wordpress(www.ruhnke.cloud)[68540]: Blocked authentication attempt for admin from ::ffff:51.15.9.27
2020-01-17 23:49:02
202.179.185.133 attackbots
Unauthorized connection attempt from IP address 202.179.185.133 on Port 445(SMB)
2020-01-17 23:38:37
46.35.251.191 attack
firewall-block, port(s): 3389/tcp
2020-01-17 23:56:18
222.186.169.194 attackspambots
Jan 17 15:35:52 zeus sshd[22784]: Failed password for root from 222.186.169.194 port 17550 ssh2
Jan 17 15:35:57 zeus sshd[22784]: Failed password for root from 222.186.169.194 port 17550 ssh2
Jan 17 15:36:02 zeus sshd[22784]: Failed password for root from 222.186.169.194 port 17550 ssh2
Jan 17 15:36:06 zeus sshd[22784]: Failed password for root from 222.186.169.194 port 17550 ssh2
Jan 17 15:36:11 zeus sshd[22784]: Failed password for root from 222.186.169.194 port 17550 ssh2
2020-01-17 23:43:00
220.156.167.132 attackbots
Brute force attempt
2020-01-17 23:47:43
138.197.32.150 attackspambots
$f2bV_matches
2020-01-17 23:36:32
190.143.146.90 attackbotsspam
Unauthorized connection attempt from IP address 190.143.146.90 on Port 445(SMB)
2020-01-17 23:57:35
206.47.210.218 attackbots
Jan 17 22:02:03 webhost01 sshd[21798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.47.210.218
Jan 17 22:02:05 webhost01 sshd[21798]: Failed password for invalid user postgres from 206.47.210.218 port 14849 ssh2
...
2020-01-17 23:29:54

Recently Reported IPs

70.42.119.34 65.26.198.143 149.226.5.48 71.232.52.26
46.253.81.163 68.175.134.129 52.165.209.67 73.231.0.173
75.255.196.36 32.8.153.129 119.96.167.50 102.100.116.180
155.250.48.57 121.128.183.142 60.18.236.197 188.53.161.211
133.206.29.69 180.160.59.80 140.174.101.127 106.16.204.220