Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.121.42.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.121.42.12.			IN	A

;; AUTHORITY SECTION:
.			172	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 12:38:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 12.42.121.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.42.121.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.90 attackspambots
Port 10002 scan denied
2020-03-28 19:02:54
198.108.67.109 attackbots
Port 8836 scan denied
2020-03-28 19:02:29
189.54.51.236 attackspambots
Telnet Server BruteForce Attack
2020-03-28 18:07:04
61.160.213.130 attackspambots
Unauthorized connection attempt detected from IP address 61.160.213.130 to port 1433
2020-03-28 18:50:48
46.101.232.76 attack
5x Failed Password
2020-03-28 18:06:04
218.159.169.3 attack
Unauthorized connection attempt detected from IP address 218.159.169.3 to port 23
2020-03-28 18:18:00
178.128.75.18 attackbots
174 packets to ports 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 7777 9999
2020-03-28 18:31:05
194.26.29.14 attack
Mar 28 11:19:54 debian-2gb-nbg1-2 kernel: \[7649861.667243\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=1357 PROTO=TCP SPT=54983 DPT=5622 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-28 18:21:37
194.26.29.110 attackbotsspam
Excessive Port-Scanning
2020-03-28 18:20:52
192.241.237.136 attackbotsspam
44818/tcp 5900/tcp 9042/tcp...
[2020-03-14/28]12pkt,9pt.(tcp),2pt.(udp)
2020-03-28 18:23:56
185.81.97.88 attack
IR_MDP583-RIPE_<177>1585367914 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 185.81.97.88:44937
2020-03-28 18:04:19
176.31.250.160 attack
2020-03-28T05:03:46.154599sorsha.thespaminator.com sshd[17161]: Invalid user glyn from 176.31.250.160 port 45542
2020-03-28T05:03:48.004006sorsha.thespaminator.com sshd[17161]: Failed password for invalid user glyn from 176.31.250.160 port 45542 ssh2
...
2020-03-28 18:13:53
66.102.6.93 attackspambots
This is supposedly my IP. I've been hacked for 4years. I'm in Canada
2020-03-28 18:14:53
193.142.146.21 attackbotsspam
2020-03-28T10:16:49.130422abusebot-8.cloudsearch.cf sshd[14784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.142.146.21  user=root
2020-03-28T10:16:50.519216abusebot-8.cloudsearch.cf sshd[14784]: Failed password for root from 193.142.146.21 port 60438 ssh2
2020-03-28T10:16:51.984583abusebot-8.cloudsearch.cf sshd[14789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.142.146.21  user=root
2020-03-28T10:16:53.649177abusebot-8.cloudsearch.cf sshd[14789]: Failed password for root from 193.142.146.21 port 33044 ssh2
2020-03-28T10:16:55.082134abusebot-8.cloudsearch.cf sshd[14794]: Invalid user administrator from 193.142.146.21 port 37758
2020-03-28T10:16:55.090811abusebot-8.cloudsearch.cf sshd[14794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.142.146.21
2020-03-28T10:16:55.082134abusebot-8.cloudsearch.cf sshd[14794]: Invalid user administrator from 19
...
2020-03-28 18:22:06
192.241.237.188 attackbotsspam
135/tcp 623/udp 50070/tcp...
[2020-03-15/27]13pkt,11pt.(tcp),2pt.(udp)
2020-03-28 18:23:33

Recently Reported IPs

112.239.7.202 112.239.69.217 112.239.65.255 112.239.66.184
112.239.7.56 112.239.7.227 112.239.8.123 112.239.84.104
112.239.7.138 113.121.42.120 112.239.88.133 112.239.88.100
112.239.85.182 112.239.88.116 112.239.84.126 112.239.84.198
112.239.9.43 112.239.84.152 112.239.9.97 112.239.9.54