Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.0.146.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.0.146.153.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:12:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 153.146.0.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 153.146.0.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.153.32.58 attack
Unauthorized connection attempt detected from IP address 36.153.32.58 to port 5555
2020-05-10 03:09:11
103.18.70.242 attackbotsspam
Unauthorized connection attempt from IP address 103.18.70.242 on Port 445(SMB)
2020-05-10 02:29:26
223.247.141.215 attackbots
May  9 02:32:32 nextcloud sshd\[14963\]: Invalid user hke from 223.247.141.215
May  9 02:32:32 nextcloud sshd\[14963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.141.215
May  9 02:32:34 nextcloud sshd\[14963\]: Failed password for invalid user hke from 223.247.141.215 port 50816 ssh2
2020-05-10 02:42:09
200.77.176.187 attackspambots
May  9 02:31:00 electroncash sshd[8651]: Invalid user guohui from 200.77.176.187 port 48412
May  9 02:31:00 electroncash sshd[8651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.77.176.187 
May  9 02:31:00 electroncash sshd[8651]: Invalid user guohui from 200.77.176.187 port 48412
May  9 02:31:02 electroncash sshd[8651]: Failed password for invalid user guohui from 200.77.176.187 port 48412 ssh2
May  9 02:35:46 electroncash sshd[9873]: Invalid user lhy from 200.77.176.187 port 58824
...
2020-05-10 02:24:24
45.55.32.34 attack
Port scan(s) denied
2020-05-10 02:43:27
212.129.152.27 attackbotsspam
May  9 02:40:42 pve1 sshd[28421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.152.27 
May  9 02:40:43 pve1 sshd[28421]: Failed password for invalid user emily from 212.129.152.27 port 41928 ssh2
...
2020-05-10 02:33:16
106.13.131.80 attack
May  8 22:35:08 web1 sshd\[445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80  user=root
May  8 22:35:10 web1 sshd\[445\]: Failed password for root from 106.13.131.80 port 55912 ssh2
May  8 22:42:28 web1 sshd\[1093\]: Invalid user mcj from 106.13.131.80
May  8 22:42:28 web1 sshd\[1093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.131.80
May  8 22:42:30 web1 sshd\[1093\]: Failed password for invalid user mcj from 106.13.131.80 port 50784 ssh2
2020-05-10 02:45:48
187.229.54.243 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-05-10 02:57:49
222.186.175.167 attackspambots
DATE:2020-05-09 11:25:03, IP:222.186.175.167, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-05-10 02:57:33
116.196.93.81 attack
May  9 09:41:48 ns382633 sshd\[933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.81  user=root
May  9 09:41:50 ns382633 sshd\[933\]: Failed password for root from 116.196.93.81 port 34994 ssh2
May  9 09:43:08 ns382633 sshd\[1142\]: Invalid user sysadmin from 116.196.93.81 port 43768
May  9 09:43:08 ns382633 sshd\[1142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.81
May  9 09:43:10 ns382633 sshd\[1142\]: Failed password for invalid user sysadmin from 116.196.93.81 port 43768 ssh2
2020-05-10 02:44:35
5.88.103.190 attackbotsspam
Honeypot attack, port: 81, PTR: net-5-88-103-190.cust.vodafonedsl.it.
2020-05-10 03:10:49
45.134.179.243 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 33888 proto: TCP cat: Misc Attack
2020-05-10 02:54:36
193.32.163.44 attackspambots
05/09/2020-04:03:19.439023 193.32.163.44 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-10 03:07:31
46.101.158.75 attackspambots
May  9 02:13:51 debian-2gb-nbg1-2 kernel: \[11242110.193713\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=46.101.158.75 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=6571 PROTO=TCP SPT=48042 DPT=24284 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-10 02:23:09
36.35.240.233 attack
DATE:2020-05-07 19:12:42, IP:36.35.240.233, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-05-10 03:06:23

Recently Reported IPs

219.211.127.165 193.221.50.253 206.134.152.57 140.104.77.250
36.215.230.78 165.195.180.238 213.151.155.133 40.4.60.233
119.80.150.107 212.119.82.205 19.106.145.108 55.205.50.104
204.118.108.160 113.33.57.68 86.113.44.83 196.53.208.188
46.181.243.111 217.216.163.212 99.169.0.7 64.84.133.194