Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.126.117.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.126.117.10.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 01:24:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 10.117.126.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.117.126.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.165.220 attack
Scan port
2023-10-07 03:48:06
144.91.111.145 attack
Scan port
2023-10-02 20:53:02
138.197.146.75 attack
Scan port
2023-09-23 19:49:04
113.190.2.39 spambotsattackproxynormal
log
2023-09-22 01:24:12
222.243.150.47 attack
This ip is using Brute force to try to access our server with RDP
2023-09-20 00:08:40
89.248.165.252 attack
Scan port
2023-09-18 12:34:30
104.152.52.99 attackproxy
Scan port
2023-10-12 12:43:37
178.68.35.42 botsattackproxy
Scan port
2023-10-02 20:50:36
2.18.38.33 attack
Scan port
2023-10-12 12:45:56
176.197.243.39 attack
Scan port
2023-09-21 15:50:23
188.17.143.44 botsattack
Scan port
2023-10-06 12:38:58
128.199.77.96 attack
Scan port
2023-09-22 17:52:35
159.183.224.104 spam
IP Block [159.183.224.104]
2023-09-19 00:58:29
45.15.19.163 attack
4 days 24hrs a day this guy in helsinki was trying to get onto my router, blocked him in the end
2023-10-12 04:31:09
196.200.184.22 spambotsattackproxynormal
196.200.184.219
196.200.184.107
196.200.184.52
196.200.184.191
196.200.184.22
196.200.184.90
196.200.184.194
196.200.184.12
196.200.184.17
196.200.184.177
196.200.184.134
196.200.184.38
196.200.184.229
196.200.184.250
196.200.184.225
196.200.184.142
196.200.184.139
196.200.184.163
196.200.184.186
196.200.184.132
196.200.184.69
196.200.184.153
196.200.184.151
196.200.184.130
196.200.184.196
196.200.184.92
196.200.184.19
196.200.184.64
196.200.184.154
196.200.184.193
196.200.184.108
196.200.184.42
196.200.184.32
196.200.184.128
196.200.184.83
196.200.184.26
196.200.184.99
196.200.184.31
196.200.184.156
196.200.184.215
196.200.184.70
196.200.184.198
196.200.184.165
196.200.184.5
196.200.184.30
196.200.184.66
196.200.184.46
196.200.184.78
196.200.184.124
196.200.184.158
196.200.184.58
196.200.184.244
196.200.184.121
196.200.184.93
196.200.184.119
196.200.184.136
196.200.184.61
196.200.184.245
196.200.184.126
196.200.184.27
196.200.184.129
196.200.184.79
196.200.184.54
196.200.184.173
196.200.184.236
196.200.184.72
196.200.184.187
196.200.184.197
196.200.184.51
196.200.184.36
196.200.184.155
196.200.184.238
196.200.184.176
196.200.184.63
196.200.184.246
196.200.184.141
196.200.184.152
196.200.184.164
196.200.184.125
196.200.184.111
196.200.184.122
196.200.184.148
196.200.184.3
196.200.184.24
2023-09-20 05:50:46

Recently Reported IPs

141.239.47.125 46.210.114.172 5.165.217.167 16.230.87.40
171.96.170.183 222.63.13.101 124.70.150.53 80.104.36.147
1.94.135.26 50.101.153.97 54.60.233.213 17.224.176.18
14.73.251.101 93.208.19.154 47.192.87.229 143.98.174.151
49.118.150.193 198.54.124.98 118.98.99.167 244.40.45.107