Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 107.242.121.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;107.242.121.23.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Thu Jul 08 02:32:38 CST 2021
;; MSG SIZE  rcvd: 43

'
Host info
Host 23.121.242.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 23.121.242.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.2.216.222 attack
 TCP (SYN) 112.2.216.222:44425 -> port 23, len 44
2020-09-06 06:11:37
190.145.12.233 attackspam
SSH Invalid Login
2020-09-06 06:00:23
61.1.69.223 attack
Sep  5 18:50:54 host sshd[6339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.1.69.223  user=root
Sep  5 18:50:56 host sshd[6339]: Failed password for root from 61.1.69.223 port 52112 ssh2
...
2020-09-06 06:12:07
222.186.42.137 attackbots
Sep  5 23:59:05 abendstille sshd\[27576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Sep  5 23:59:07 abendstille sshd\[27576\]: Failed password for root from 222.186.42.137 port 12678 ssh2
Sep  5 23:59:10 abendstille sshd\[27576\]: Failed password for root from 222.186.42.137 port 12678 ssh2
Sep  5 23:59:12 abendstille sshd\[27576\]: Failed password for root from 222.186.42.137 port 12678 ssh2
Sep  5 23:59:14 abendstille sshd\[27718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
...
2020-09-06 06:00:57
193.27.229.224 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 50243 proto: tcp cat: Misc Attackbytes: 60
2020-09-06 06:27:30
85.209.0.102 attackspam
srv02 SSH BruteForce Attacks 22 ..
2020-09-06 05:55:29
45.142.120.121 attack
Sep  6 00:13:59 baraca dovecot: auth-worker(58929): passwd(mughal@net.ua,45.142.120.121): unknown user
Sep  6 00:14:45 baraca dovecot: auth-worker(58929): passwd(eris@net.ua,45.142.120.121): unknown user
Sep  6 00:15:28 baraca dovecot: auth-worker(58929): passwd(22222@net.ua,45.142.120.121): unknown user
Sep  6 00:15:59 baraca dovecot: auth-worker(58929): passwd(ines@net.ua,45.142.120.121): unknown user
Sep  6 01:16:26 baraca dovecot: auth-worker(63039): passwd(user_name@net.ua,45.142.120.121): unknown user
Sep  6 01:17:09 baraca dovecot: auth-worker(63039): passwd(door@net.ua,45.142.120.121): unknown user
...
2020-09-06 06:21:04
85.209.0.252 attackbotsspam
 TCP (SYN) 85.209.0.252:48930 -> port 22, len 60
2020-09-06 06:04:14
89.248.171.89 attackbotsspam
Sep  5 23:06:46 mail postfix/smtpd\[1456\]: warning: unknown\[89.248.171.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 23:07:51 mail postfix/smtpd\[1549\]: warning: unknown\[89.248.171.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 23:50:56 mail postfix/smtpd\[3368\]: warning: unknown\[89.248.171.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep  5 23:51:35 mail postfix/smtpd\[3167\]: warning: unknown\[89.248.171.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-06 05:59:56
41.44.127.241 attackspambots
1599324666 - 09/05/2020 23:51:06 Host: host-41.44.127.241.tedata.net/41.44.127.241 Port: 23 TCP Blocked
...
2020-09-06 06:08:20
222.169.117.250 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-09-06 06:22:46
1.232.176.9 attackspambots
RDP brute force attack detected by fail2ban
2020-09-06 05:56:31
192.241.230.44 attackspam
8983/tcp 9042/tcp 2000/tcp...
[2020-08-26/09-05]10pkt,9pt.(tcp)
2020-09-06 06:29:42
107.189.11.160 attackspambots
Sep  6 00:20:15 OPSO sshd\[12015\]: Invalid user vagrant from 107.189.11.160 port 55320
Sep  6 00:20:15 OPSO sshd\[12021\]: Invalid user test from 107.189.11.160 port 55324
Sep  6 00:20:15 OPSO sshd\[12018\]: Invalid user centos from 107.189.11.160 port 55318
Sep  6 00:20:15 OPSO sshd\[12019\]: Invalid user postgres from 107.189.11.160 port 55322
Sep  6 00:20:15 OPSO sshd\[12020\]: Invalid user oracle from 107.189.11.160 port 55326
Sep  6 00:20:15 OPSO sshd\[12017\]: Invalid user ubuntu from 107.189.11.160 port 55316
2020-09-06 06:25:52
61.144.97.94 attack
Lines containing failures of 61.144.97.94
Aug 30 18:29:04 metroid sshd[30822]: refused connect from 61.144.97.94 (61.144.97.94)
Aug 30 21:50:04 metroid sshd[15525]: refused connect from 61.144.97.94 (61.144.97.94)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.144.97.94
2020-09-06 06:30:14

Recently Reported IPs

99.230.133.199 99.230.123.199 85.230.123.199 98.230.123.199
99.231.123.199 218.255.116.206 178.128.50.93 2.58.148.71
116.179.32.94 77.204.245.85 176.98.76.118 149.167.138.33
98.186.197.145 159.89.183.147 186.70.205.76 67.170.223.50
103.80.64.130 182.200.19.139 103.80.63.130 183.83.238.164