Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ansan-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.139.253.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27752
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.139.253.223.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071401 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 05:16:09 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 223.253.139.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 223.253.139.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.245.174.128 attackspambots
SpamScore above: 10.0
2020-04-15 21:12:41
106.13.41.87 attackbots
2020-04-15T12:06:01.306073dmca.cloudsearch.cf sshd[22622]: Invalid user ooo from 106.13.41.87 port 44382
2020-04-15T12:06:01.312155dmca.cloudsearch.cf sshd[22622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.87
2020-04-15T12:06:01.306073dmca.cloudsearch.cf sshd[22622]: Invalid user ooo from 106.13.41.87 port 44382
2020-04-15T12:06:03.051158dmca.cloudsearch.cf sshd[22622]: Failed password for invalid user ooo from 106.13.41.87 port 44382 ssh2
2020-04-15T12:12:52.171891dmca.cloudsearch.cf sshd[23085]: Invalid user user from 106.13.41.87 port 56640
2020-04-15T12:12:52.177932dmca.cloudsearch.cf sshd[23085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.87
2020-04-15T12:12:52.171891dmca.cloudsearch.cf sshd[23085]: Invalid user user from 106.13.41.87 port 56640
2020-04-15T12:12:54.338681dmca.cloudsearch.cf sshd[23085]: Failed password for invalid user user from 106.13.41.87 port 56640 ss
...
2020-04-15 20:55:47
220.87.211.214 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-15 21:11:05
200.0.236.210 attack
Fail2Ban Ban Triggered (2)
2020-04-15 21:15:35
78.153.235.147 attackbots
RDP Brute-Force (Grieskirchen RZ1)
2020-04-15 20:52:32
165.22.23.57 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-04-15 21:15:13
91.205.239.15 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-15 21:07:49
222.186.190.14 attackspambots
15.04.2020 12:59:08 SSH access blocked by firewall
2020-04-15 21:14:35
167.71.222.137 attackbots
DATE:2020-04-15 14:12:22, IP:167.71.222.137, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-04-15 21:22:37
45.125.65.35 attackspambots
Apr 15 14:41:55 srv01 postfix/smtpd\[19117\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 14:43:07 srv01 postfix/smtpd\[19115\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 14:43:28 srv01 postfix/smtpd\[19117\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 14:43:35 srv01 postfix/smtpd\[19117\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 15 14:52:03 srv01 postfix/smtpd\[19115\]: warning: unknown\[45.125.65.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-15 20:59:13
134.209.235.196 attackbotsspam
$f2bV_matches
2020-04-15 21:03:22
89.248.160.150 attackbotsspam
89.248.160.150 was recorded 24 times by 14 hosts attempting to connect to the following ports: 40844,40850,40854,40843. Incident counter (4h, 24h, all-time): 24, 123, 11280
2020-04-15 21:10:03
175.24.83.214 attack
prod11
...
2020-04-15 21:25:19
182.61.160.77 attackspambots
5x Failed Password
2020-04-15 21:00:56
114.84.93.227 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-15 21:02:22

Recently Reported IPs

99.253.4.48 72.194.177.27 201.172.29.194 161.115.39.109
98.116.9.114 84.125.69.152 31.180.136.17 82.57.217.122
85.178.51.100 188.244.187.46 90.58.221.131 68.112.217.37
133.208.240.196 106.235.182.165 115.183.204.157 195.154.150.149
42.97.239.54 112.125.52.79 118.163.243.151 47.54.248.5