Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Songpa-gu

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.164.34.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.164.34.200.			IN	A

;; AUTHORITY SECTION:
.			198	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 28 23:47:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 200.34.164.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.34.164.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.81.96.67 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-05 18:33:17
185.211.245.149 attackspam
firewall-block, port(s): 22/tcp
2020-05-05 18:31:44
69.195.153.194 attack
Scanning
2020-05-05 19:01:53
198.54.125.78 attack
abcdata-sys.de:80 198.54.125.78 - - [05/May/2020:11:20:06 +0200] "POST /xmlrpc.php HTTP/1.1" 301 441 "-" "Poster"
www.goldgier.de 198.54.125.78 [05/May/2020:11:20:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4479 "-" "Poster"
2020-05-05 18:46:11
185.173.35.9 attackbotsspam
Fail2Ban Ban Triggered
2020-05-05 18:51:32
153.139.231.197 attack
Brute forcing email accounts
2020-05-05 18:49:46
213.149.171.218 attackspambots
Unauthorized IMAP connection attempt
2020-05-05 18:25:59
106.0.55.146 attackbots
1588670417 - 05/05/2020 11:20:17 Host: 106.0.55.146/106.0.55.146 Port: 445 TCP Blocked
2020-05-05 18:20:33
113.116.156.157 attackspam
Lines containing failures of 113.116.156.157 (max 1000)
May  5 10:08:26 efa3 sshd[15879]: Invalid user login from 113.116.156.157 port 52814
May  5 10:08:26 efa3 sshd[15879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.116.156.157
May  5 10:08:28 efa3 sshd[15879]: Failed password for invalid user login from 113.116.156.157 port 52814 ssh2
May  5 10:08:28 efa3 sshd[15879]: Received disconnect from 113.116.156.157 port 52814:11: Bye Bye [preauth]
May  5 10:08:28 efa3 sshd[15879]: Disconnected from 113.116.156.157 port 52814 [preauth]
May  5 10:17:48 efa3 sshd[17268]: Invalid user sheila from 113.116.156.157 port 39724
May  5 10:17:48 efa3 sshd[17268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.116.156.157
May  5 10:17:50 efa3 sshd[17268]: Failed password for invalid user sheila from 113.116.156.157 port 39724 ssh2
May  5 10:17:50 efa3 sshd[17268]: Received disconnect from 113.1........
------------------------------
2020-05-05 18:50:22
220.180.104.130 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-05 18:33:41
152.136.153.17 attack
May  5 09:22:39 XXX sshd[57451]: Invalid user sysadm from 152.136.153.17 port 33386
2020-05-05 18:54:00
49.176.146.35 attackspam
$f2bV_matches
2020-05-05 18:29:29
1.205.128.90 attackspambots
Scanning
2020-05-05 18:26:35
103.82.81.110 attackbots
firewall-block, port(s): 445/tcp
2020-05-05 18:42:30
104.248.149.130 attackbots
SSH brutforce
2020-05-05 18:55:21

Recently Reported IPs

60.61.206.231 37.211.24.113 102.101.181.153 113.63.31.59
188.47.199.2 201.234.115.99 178.236.112.243 236.236.108.189
18.71.242.111 87.116.58.59 187.81.122.21 53.94.183.135
170.154.17.63 40.112.19.221 202.239.96.62 14.251.57.226
90.126.195.19 82.238.49.172 212.89.237.37 175.155.194.212