Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.138.23.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.138.23.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:31:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 103.23.138.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.23.138.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.92.5.105 attackbots
Dec 16 01:48:04 debian-2gb-vpn-nbg1-1 kernel: [828455.701704] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.5.105 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=12235 DF PROTO=TCP SPT=47683 DPT=25 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-16 09:08:55
45.119.215.68 attack
Dec 15 18:50:12 sachi sshd\[27962\]: Invalid user durk from 45.119.215.68
Dec 15 18:50:12 sachi sshd\[27962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68
Dec 15 18:50:14 sachi sshd\[27962\]: Failed password for invalid user durk from 45.119.215.68 port 60482 ssh2
Dec 15 18:57:49 sachi sshd\[28576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.215.68  user=nobody
Dec 15 18:57:50 sachi sshd\[28576\]: Failed password for nobody from 45.119.215.68 port 40012 ssh2
2019-12-16 13:07:25
106.54.196.9 attackbotsspam
Dec 16 00:53:02 nextcloud sshd\[21957\]: Invalid user emlynne from 106.54.196.9
Dec 16 00:53:02 nextcloud sshd\[21957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.9
Dec 16 00:53:04 nextcloud sshd\[21957\]: Failed password for invalid user emlynne from 106.54.196.9 port 60328 ssh2
...
2019-12-16 08:52:25
40.65.182.4 attack
Dec 15 18:51:49 auw2 sshd\[11481\]: Invalid user server from 40.65.182.4
Dec 15 18:51:49 auw2 sshd\[11481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.65.182.4
Dec 15 18:51:51 auw2 sshd\[11481\]: Failed password for invalid user server from 40.65.182.4 port 38698 ssh2
Dec 15 18:57:57 auw2 sshd\[12086\]: Invalid user espenson from 40.65.182.4
Dec 15 18:57:57 auw2 sshd\[12086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.65.182.4
2019-12-16 13:00:40
60.12.18.6 attackbots
Dec 16 01:45:01 debian-2gb-nbg1-2 kernel: \[109889.369804\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=60.12.18.6 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=99 ID=256 PROTO=TCP SPT=54783 DPT=8080 WINDOW=16384 RES=0x00 SYN URGP=0
2019-12-16 09:00:06
217.34.40.6 attack
5500/tcp 5500/tcp 5500/tcp
[2019-12-11/14]3pkt
2019-12-16 08:51:22
182.61.176.105 attack
$f2bV_matches
2019-12-16 08:54:46
52.41.40.203 attackspambots
Dec 15 19:08:49 php1 sshd\[30116\]: Invalid user squid from 52.41.40.203
Dec 15 19:08:49 php1 sshd\[30116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.41.40.203
Dec 15 19:08:51 php1 sshd\[30116\]: Failed password for invalid user squid from 52.41.40.203 port 56872 ssh2
Dec 15 19:14:27 php1 sshd\[30791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.41.40.203  user=root
Dec 15 19:14:29 php1 sshd\[30791\]: Failed password for root from 52.41.40.203 port 33155 ssh2
2019-12-16 13:16:33
36.234.134.244 attackbots
23/tcp 23/tcp
[2019-12-13/14]2pkt
2019-12-16 09:12:53
113.196.184.162 attack
Unauthorized connection attempt detected from IP address 113.196.184.162 to port 445
2019-12-16 13:03:39
213.32.22.239 attackspambots
Dec 16 01:51:35 nextcloud sshd\[24953\]: Invalid user faulks from 213.32.22.239
Dec 16 01:51:35 nextcloud sshd\[24953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.22.239
Dec 16 01:51:37 nextcloud sshd\[24953\]: Failed password for invalid user faulks from 213.32.22.239 port 33438 ssh2
...
2019-12-16 09:00:49
60.190.56.6 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-16 09:06:16
142.93.235.47 attackbotsspam
Dec 16 01:03:22 game-panel sshd[25250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47
Dec 16 01:03:24 game-panel sshd[25250]: Failed password for invalid user mikizo from 142.93.235.47 port 43244 ssh2
Dec 16 01:08:21 game-panel sshd[25463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47
2019-12-16 09:15:11
202.151.30.141 attack
--- report ---
Dec 16 01:56:51 sshd: Connection from 202.151.30.141 port 56782
Dec 16 01:56:53 sshd: Invalid user watten from 202.151.30.141
Dec 16 01:56:55 sshd: Failed password for invalid user watten from 202.151.30.141 port 56782 ssh2
Dec 16 01:56:55 sshd: Received disconnect from 202.151.30.141: 11: Bye Bye [preauth]
2019-12-16 13:15:39
222.124.16.227 attack
$f2bV_matches
2019-12-16 13:15:23

Recently Reported IPs

34.160.219.129 72.162.244.200 21.71.25.201 66.178.194.160
152.80.78.253 204.223.234.164 184.144.56.60 75.63.197.86
57.50.239.148 250.133.112.218 189.42.46.0 159.219.70.216
13.193.44.49 156.153.57.129 31.213.219.196 249.191.14.104
90.201.76.11 196.156.62.108 123.47.145.11 88.2.64.33