Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gangnam-gu

Region: Seoul

Country: South Korea

Internet Service Provider: KT Corporation

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Sep 25 01:57:54 v22019038103785759 sshd\[17034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Sep 25 01:57:56 v22019038103785759 sshd\[17034\]: Failed password for root from 121.134.159.21 port 43850 ssh2
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: Invalid user princess from 121.134.159.21 port 51704
Sep 25 02:01:56 v22019038103785759 sshd\[17377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Sep 25 02:01:58 v22019038103785759 sshd\[17377\]: Failed password for invalid user princess from 121.134.159.21 port 51704 ssh2
...
2020-09-25 08:50:38
attackspambots
2020-08-29T08:46:15.393715lavrinenko.info sshd[4756]: Failed password for root from 121.134.159.21 port 58952 ssh2
2020-08-29T08:49:20.267410lavrinenko.info sshd[4906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
2020-08-29T08:49:22.551211lavrinenko.info sshd[4906]: Failed password for root from 121.134.159.21 port 47558 ssh2
2020-08-29T08:52:22.663095lavrinenko.info sshd[5009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
2020-08-29T08:52:24.595999lavrinenko.info sshd[5009]: Failed password for root from 121.134.159.21 port 36154 ssh2
...
2020-08-29 13:59:59
attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-28T04:58:49Z and 2020-08-28T05:06:29Z
2020-08-28 15:33:12
attack
Aug  3 22:32:36 kh-dev-server sshd[16951]: Failed password for root from 121.134.159.21 port 37308 ssh2
...
2020-08-04 08:42:02
attack
Failed password for invalid user wangq from 121.134.159.21 port 44120 ssh2
2020-07-30 19:00:38
attackbots
Jul 24 00:13:47 ajax sshd[22291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 
Jul 24 00:13:49 ajax sshd[22291]: Failed password for invalid user zli from 121.134.159.21 port 41674 ssh2
2020-07-24 07:15:02
attackbotsspam
invalid login attempt (staff)
2020-07-23 22:10:36
attack
Jul 23 05:58:59 *hidden* sshd[44568]: Invalid user nui from 121.134.159.21 port 59858 Jul 23 05:58:59 *hidden* sshd[44568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 Jul 23 05:59:01 *hidden* sshd[44568]: Failed password for invalid user nui from 121.134.159.21 port 59858 ssh2
2020-07-23 12:36:58
attack
$f2bV_matches
2020-07-23 00:46:35
attackspam
Bruteforce detected by fail2ban
2020-07-22 00:09:42
attack
Jul 17 00:45:14 mockhub sshd[25153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Jul 17 00:45:17 mockhub sshd[25153]: Failed password for invalid user postgres from 121.134.159.21 port 51558 ssh2
...
2020-07-17 15:45:37
attack
Jul 16 11:45:56 ip-172-31-62-245 sshd\[17801\]: Invalid user danny from 121.134.159.21\
Jul 16 11:45:57 ip-172-31-62-245 sshd\[17801\]: Failed password for invalid user danny from 121.134.159.21 port 55842 ssh2\
Jul 16 11:50:02 ip-172-31-62-245 sshd\[17853\]: Invalid user malina from 121.134.159.21\
Jul 16 11:50:04 ip-172-31-62-245 sshd\[17853\]: Failed password for invalid user malina from 121.134.159.21 port 60106 ssh2\
Jul 16 11:54:06 ip-172-31-62-245 sshd\[17921\]: Invalid user rori from 121.134.159.21\
2020-07-16 21:04:32
attackspam
2020-07-08T13:29:10.252297ns386461 sshd\[20890\]: Invalid user ryc from 121.134.159.21 port 34208
2020-07-08T13:29:10.257046ns386461 sshd\[20890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-07-08T13:29:12.541969ns386461 sshd\[20890\]: Failed password for invalid user ryc from 121.134.159.21 port 34208 ssh2
2020-07-08T13:48:06.585995ns386461 sshd\[6125\]: Invalid user tanjunhui from 121.134.159.21 port 35390
2020-07-08T13:48:06.589768ns386461 sshd\[6125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
...
2020-07-08 21:10:57
attackbots
Jul  8 sshd[10934]: Invalid user sonya from 121.134.159.21 port 39248
2020-07-08 14:40:31
attackbots
Jul  7 14:44:54 ns382633 sshd\[30845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Jul  7 14:44:56 ns382633 sshd\[30845\]: Failed password for root from 121.134.159.21 port 44476 ssh2
Jul  7 14:49:37 ns382633 sshd\[31684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Jul  7 14:49:39 ns382633 sshd\[31684\]: Failed password for root from 121.134.159.21 port 51754 ssh2
Jul  7 14:52:48 ns382633 sshd\[32449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
2020-07-07 21:11:59
attackbots
Jun 15 23:10:17 legacy sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Jun 15 23:10:19 legacy sshd[24176]: Failed password for invalid user mis from 121.134.159.21 port 38788 ssh2
Jun 15 23:12:39 legacy sshd[24284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
...
2020-06-16 05:20:53
attack
Scanned 3 times in the last 24 hours on port 22
2020-06-15 09:46:22
attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-13 21:35:49
attackspambots
2020-06-10T17:22:32.9738851495-001 sshd[10889]: Failed password for root from 121.134.159.21 port 40372 ssh2
2020-06-10T17:26:16.2353571495-001 sshd[11002]: Invalid user ln from 121.134.159.21 port 41724
2020-06-10T17:26:16.2384251495-001 sshd[11002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-06-10T17:26:16.2353571495-001 sshd[11002]: Invalid user ln from 121.134.159.21 port 41724
2020-06-10T17:26:18.4491831495-001 sshd[11002]: Failed password for invalid user ln from 121.134.159.21 port 41724 ssh2
2020-06-10T17:29:57.2474611495-001 sshd[11111]: Invalid user ci from 121.134.159.21 port 43094
...
2020-06-11 06:55:46
attackbots
2020-06-10T21:12:51.169558lavrinenko.info sshd[15546]: Failed password for root from 121.134.159.21 port 52906 ssh2
2020-06-10T21:16:26.984303lavrinenko.info sshd[15803]: Invalid user bi from 121.134.159.21 port 53546
2020-06-10T21:16:26.997958lavrinenko.info sshd[15803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-06-10T21:16:26.984303lavrinenko.info sshd[15803]: Invalid user bi from 121.134.159.21 port 53546
2020-06-10T21:16:28.893993lavrinenko.info sshd[15803]: Failed password for invalid user bi from 121.134.159.21 port 53546 ssh2
...
2020-06-11 03:19:25
attack
" "
2020-06-08 23:27:21
attack
Feb 25 01:50:30 lnxded64 sshd[28616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-02-25 10:17:36
attackbotsspam
Feb 19 15:00:24 dedicated sshd[29272]: Invalid user dev from 121.134.159.21 port 40536
2020-02-19 22:20:32
attackspambots
Feb 11 16:34:35 silence02 sshd[1379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
Feb 11 16:34:37 silence02 sshd[1379]: Failed password for invalid user lcq from 121.134.159.21 port 59498 ssh2
Feb 11 16:38:07 silence02 sshd[1632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-02-11 23:42:16
attackspam
Unauthorized connection attempt detected from IP address 121.134.159.21 to port 2220 [J]
2020-02-03 06:43:28
attackspambots
2020-01-07T09:58:15.6554461495-001 sshd[7145]: Invalid user bpadmin from 121.134.159.21 port 48530
2020-01-07T09:58:15.6584811495-001 sshd[7145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-01-07T09:58:15.6554461495-001 sshd[7145]: Invalid user bpadmin from 121.134.159.21 port 48530
2020-01-07T09:58:18.4393671495-001 sshd[7145]: Failed password for invalid user bpadmin from 121.134.159.21 port 48530 ssh2
2020-01-07T10:01:43.9831421495-001 sshd[7363]: Invalid user qtp from 121.134.159.21 port 48776
2020-01-07T10:01:43.9871501495-001 sshd[7363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2020-01-07T10:01:43.9831421495-001 sshd[7363]: Invalid user qtp from 121.134.159.21 port 48776
2020-01-07T10:01:46.3215941495-001 sshd[7363]: Failed password for invalid user qtp from 121.134.159.21 port 48776 ssh2
2020-01-07T10:05:11.1766081495-001 sshd[7465]: pam_unix(sshd:auth): 
...
2020-01-08 00:13:58
attackbotsspam
Unauthorized SSH login attempts
2019-12-25 04:10:54
attack
$f2bV_matches
2019-12-18 00:51:23
attackbots
Dec  6 17:51:57 [host] sshd[14931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21  user=root
Dec  6 17:51:59 [host] sshd[14931]: Failed password for root from 121.134.159.21 port 50636 ssh2
Dec  6 17:58:10 [host] sshd[15033]: Invalid user ching from 121.134.159.21
2019-12-07 01:09:58
attackbots
2019-12-03T10:41:18.538987  sshd[9885]: Invalid user beth from 121.134.159.21 port 55402
2019-12-03T10:41:18.553050  sshd[9885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21
2019-12-03T10:41:18.538987  sshd[9885]: Invalid user beth from 121.134.159.21 port 55402
2019-12-03T10:41:20.432522  sshd[9885]: Failed password for invalid user beth from 121.134.159.21 port 55402 ssh2
2019-12-03T10:47:52.551426  sshd[10050]: Invalid user diana from 121.134.159.21 port 38392
...
2019-12-03 18:04:42
Comments on same subnet:
IP Type Details Datetime
121.134.159.2 attackspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 03:00:54
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.134.159.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44004
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.134.159.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Mar 30 00:58:18 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 21.159.134.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 21.159.134.121.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
222.124.16.227 attackspambots
Nov 29 22:14:49 sachi sshd\[32528\]: Invalid user derud from 222.124.16.227
Nov 29 22:14:49 sachi sshd\[32528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
Nov 29 22:14:51 sachi sshd\[32528\]: Failed password for invalid user derud from 222.124.16.227 port 41654 ssh2
Nov 29 22:22:34 sachi sshd\[767\]: Invalid user since from 222.124.16.227
Nov 29 22:22:34 sachi sshd\[767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
2019-11-30 16:37:28
129.204.200.85 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-11-30 16:08:22
113.172.2.125 attack
SMTP-sasl brute force
...
2019-11-30 16:15:46
187.107.16.138 attackbots
Honeypot attack, port: 23, PTR: bb6b108a.virtua.com.br.
2019-11-30 16:42:36
159.89.231.172 attackbots
Nov 30 08:42:03 srv01 sshd[7533]: Invalid user bad from 159.89.231.172 port 53308
Nov 30 08:42:03 srv01 sshd[7533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.231.172
Nov 30 08:42:03 srv01 sshd[7533]: Invalid user bad from 159.89.231.172 port 53308
Nov 30 08:42:05 srv01 sshd[7533]: Failed password for invalid user bad from 159.89.231.172 port 53308 ssh2
Nov 30 08:42:05 srv01 sshd[7538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.231.172  user=root
Nov 30 08:42:07 srv01 sshd[7538]: Failed password for root from 159.89.231.172 port 53744 ssh2
...
2019-11-30 16:43:06
101.255.52.171 attackspambots
Nov 30 07:56:35 venus sshd\[2486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.52.171  user=root
Nov 30 07:56:37 venus sshd\[2486\]: Failed password for root from 101.255.52.171 port 59324 ssh2
Nov 30 08:00:01 venus sshd\[2543\]: Invalid user pad from 101.255.52.171 port 38216
...
2019-11-30 16:20:38
62.234.141.48 attackspam
Nov 30 13:53:14 vibhu-HP-Z238-Microtower-Workstation sshd\[21408\]: Invalid user bonaparte from 62.234.141.48
Nov 30 13:53:14 vibhu-HP-Z238-Microtower-Workstation sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48
Nov 30 13:53:16 vibhu-HP-Z238-Microtower-Workstation sshd\[21408\]: Failed password for invalid user bonaparte from 62.234.141.48 port 53056 ssh2
Nov 30 13:56:48 vibhu-HP-Z238-Microtower-Workstation sshd\[22295\]: Invalid user pass9999 from 62.234.141.48
Nov 30 13:56:48 vibhu-HP-Z238-Microtower-Workstation sshd\[22295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48
...
2019-11-30 16:35:04
218.92.0.148 attackspam
Nov 30 09:44:28 OPSO sshd\[26228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Nov 30 09:44:30 OPSO sshd\[26228\]: Failed password for root from 218.92.0.148 port 7410 ssh2
Nov 30 09:44:33 OPSO sshd\[26228\]: Failed password for root from 218.92.0.148 port 7410 ssh2
Nov 30 09:44:36 OPSO sshd\[26228\]: Failed password for root from 218.92.0.148 port 7410 ssh2
Nov 30 09:44:39 OPSO sshd\[26228\]: Failed password for root from 218.92.0.148 port 7410 ssh2
2019-11-30 16:45:37
185.211.245.198 attackbots
Nov 30 09:05:15 andromeda postfix/smtpd\[33666\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 30 09:05:16 andromeda postfix/smtpd\[34748\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 30 09:05:43 andromeda postfix/smtpd\[47626\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 30 09:05:44 andromeda postfix/smtpd\[34748\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
Nov 30 09:06:02 andromeda postfix/smtpd\[47626\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: authentication failure
2019-11-30 16:26:35
216.45.23.6 attackbots
Nov 30 13:21:26 itv-usvr-01 sshd[16596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6  user=root
Nov 30 13:21:28 itv-usvr-01 sshd[16596]: Failed password for root from 216.45.23.6 port 60913 ssh2
Nov 30 13:24:38 itv-usvr-01 sshd[16680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6  user=root
Nov 30 13:24:40 itv-usvr-01 sshd[16680]: Failed password for root from 216.45.23.6 port 50507 ssh2
Nov 30 13:28:06 itv-usvr-01 sshd[16829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6  user=root
Nov 30 13:28:08 itv-usvr-01 sshd[16829]: Failed password for root from 216.45.23.6 port 40099 ssh2
2019-11-30 16:28:25
209.17.96.42 attackbots
Port scan: Attack repeated for 24 hours
2019-11-30 16:35:52
118.71.13.181 attackbotsspam
Honeypot attack, port: 23, PTR: ip-address-pool-xxx.fpt.vn.
2019-11-30 16:14:19
46.38.144.32 attack
Nov 30 09:06:07 relay postfix/smtpd\[6863\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 09:06:57 relay postfix/smtpd\[32571\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 09:07:24 relay postfix/smtpd\[2787\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 09:08:09 relay postfix/smtpd\[30742\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 30 09:08:40 relay postfix/smtpd\[7450\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-30 16:16:14
144.217.166.92 attack
Invalid user pcap from 144.217.166.92 port 47402
2019-11-30 16:14:04
94.191.20.179 attackspam
2019-11-30T02:24:31.4397201495-001 sshd\[4434\]: Invalid user kine from 94.191.20.179 port 34368
2019-11-30T02:24:31.4495121495-001 sshd\[4434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
2019-11-30T02:24:34.0041711495-001 sshd\[4434\]: Failed password for invalid user kine from 94.191.20.179 port 34368 ssh2
2019-11-30T02:28:45.1385181495-001 sshd\[4564\]: Invalid user zzzzzz from 94.191.20.179 port 38738
2019-11-30T02:28:45.1429591495-001 sshd\[4564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
2019-11-30T02:28:46.8997541495-001 sshd\[4564\]: Failed password for invalid user zzzzzz from 94.191.20.179 port 38738 ssh2
...
2019-11-30 16:25:23

Recently Reported IPs

122.224.65.197 120.88.185.39 119.9.27.50 113.16.199.94
111.166.23.63 104.248.151.241 104.236.181.90 94.230.136.33
91.134.140.255 86.57.237.88 66.214.207.90 64.13.232.18
60.249.222.64 46.101.1.198 37.53.85.14 36.67.61.247
35.199.172.14 5.196.88.58 2.234.127.61 213.215.100.29