Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.13.54.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.13.54.145.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:00:18 CST 2022
;; MSG SIZE  rcvd: 106
Host info
145.54.13.121.in-addr.arpa domain name pointer 145.54.13.121.broad.dg.gd.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.54.13.121.in-addr.arpa	name = 145.54.13.121.broad.dg.gd.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.167.225.118 attackbots
Apr 18 05:50:50 nextcloud sshd\[23794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.225.118  user=root
Apr 18 05:50:52 nextcloud sshd\[23794\]: Failed password for root from 180.167.225.118 port 39418 ssh2
Apr 18 05:56:22 nextcloud sshd\[29451\]: Invalid user test from 180.167.225.118
Apr 18 05:56:22 nextcloud sshd\[29451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.225.118
2020-04-18 13:42:07
152.136.152.220 attackbotsspam
Apr 18 07:07:44 vps647732 sshd[27881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.152.220
Apr 18 07:07:46 vps647732 sshd[27881]: Failed password for invalid user jo from 152.136.152.220 port 39076 ssh2
...
2020-04-18 13:16:11
102.130.118.84 attack
Apr 17 19:07:56 php1 sshd\[11238\]: Invalid user od from 102.130.118.84
Apr 17 19:07:56 php1 sshd\[11238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.118.84
Apr 17 19:07:58 php1 sshd\[11238\]: Failed password for invalid user od from 102.130.118.84 port 49872 ssh2
Apr 17 19:12:54 php1 sshd\[11779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.118.84  user=root
Apr 17 19:12:56 php1 sshd\[11779\]: Failed password for root from 102.130.118.84 port 60402 ssh2
2020-04-18 13:32:17
77.42.86.84 attackspam
Automatic report - Port Scan Attack
2020-04-18 13:27:00
69.229.6.11 attackbots
2020-04-18T03:47:36.477550abusebot.cloudsearch.cf sshd[14151]: Invalid user admin from 69.229.6.11 port 49734
2020-04-18T03:47:36.483432abusebot.cloudsearch.cf sshd[14151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.11
2020-04-18T03:47:36.477550abusebot.cloudsearch.cf sshd[14151]: Invalid user admin from 69.229.6.11 port 49734
2020-04-18T03:47:38.766342abusebot.cloudsearch.cf sshd[14151]: Failed password for invalid user admin from 69.229.6.11 port 49734 ssh2
2020-04-18T03:52:26.889611abusebot.cloudsearch.cf sshd[14562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.11  user=root
2020-04-18T03:52:29.649551abusebot.cloudsearch.cf sshd[14562]: Failed password for root from 69.229.6.11 port 57180 ssh2
2020-04-18T03:57:08.378742abusebot.cloudsearch.cf sshd[14973]: Invalid user postgres from 69.229.6.11 port 36394
...
2020-04-18 13:14:08
222.186.190.14 attack
Apr 18 07:19:50 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
Apr 18 07:19:53 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
Apr 18 07:19:55 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
...
2020-04-18 13:36:23
68.183.183.21 attackbots
$f2bV_matches
2020-04-18 13:47:40
124.192.225.227 attackspambots
Apr 18 05:51:46 * sshd[12640]: Failed password for root from 124.192.225.227 port 7490 ssh2
2020-04-18 13:18:26
47.5.200.48 attackspambots
2020-04-17T20:56:51.208664suse-nuc sshd[29304]: Invalid user mh from 47.5.200.48 port 54532
...
2020-04-18 13:24:51
80.227.51.114 attack
Email SMTP authentication failure
2020-04-18 13:21:15
163.44.153.96 attackspambots
invalid user
2020-04-18 13:09:37
103.215.37.23 attackspambots
Unauthorized IMAP connection attempt
2020-04-18 13:13:18
193.252.189.177 attackspam
$f2bV_matches
2020-04-18 13:19:29
149.28.142.149 attackbots
5x Failed Password
2020-04-18 13:34:27
206.189.3.176 attackbotsspam
Invalid user hf from 206.189.3.176 port 45324
2020-04-18 13:43:17

Recently Reported IPs

121.13.29.99 121.13.54.100 121.13.54.238 121.13.55.116
121.13.55.160 114.25.113.79 121.13.55.68 121.13.54.220
121.13.64.151 121.13.85.66 121.13.64.112 121.130.120.201
121.130.146.161 121.130.17.154 121.130.189.38 121.130.181.170
121.130.208.243 114.251.154.253 121.130.42.187 121.130.24.48