Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.143.38.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.143.38.105.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070301 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 04 08:54:11 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 105.38.143.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.38.143.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
39.76.83.25 attack
Unauthorized connection attempt detected from IP address 39.76.83.25 to port 23 [J]
2020-02-02 03:33:21
144.121.28.206 attack
Feb  1 19:47:17 markkoudstaal sshd[11230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.121.28.206
Feb  1 19:47:19 markkoudstaal sshd[11230]: Failed password for invalid user guest from 144.121.28.206 port 46384 ssh2
Feb  1 19:50:27 markkoudstaal sshd[11828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.121.28.206
2020-02-02 02:58:20
83.249.218.211 attackspam
Unauthorized connection attempt detected from IP address 83.249.218.211 to port 5555 [J]
2020-02-02 03:08:55
51.158.160.91 attackbots
02/01/2020-14:06:16.982064 51.158.160.91 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-02 03:32:55
132.232.113.102 attackspam
Unauthorized connection attempt detected from IP address 132.232.113.102 to port 2220 [J]
2020-02-02 03:00:17
143.176.18.30 attack
Dec 15 04:23:12 v22018076590370373 sshd[8213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.176.18.30 
...
2020-02-02 03:14:39
78.85.34.138 attackbots
1433/tcp 1433/tcp
[2020-02-01]2pkt
2020-02-02 02:56:23
185.232.67.5 attack
Feb  1 20:28:34 dedicated sshd[28221]: Invalid user admin from 185.232.67.5 port 41340
2020-02-02 03:30:19
182.74.175.38 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 03:31:55
92.249.143.33 attack
Automatic report - Banned IP Access
2020-02-02 03:13:36
51.158.121.224 attackspambots
445/tcp
[2020-02-01]1pkt
2020-02-02 03:31:05
61.2.150.61 attack
445/tcp
[2020-02-01]1pkt
2020-02-02 02:59:08
181.57.129.54 attack
Honeypot attack, port: 445, PTR: static-ip-1815712954.cable.net.co.
2020-02-02 03:33:47
142.93.33.62 attack
...
2020-02-02 03:28:32
51.38.39.222 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-02 02:57:04

Recently Reported IPs

156.96.118.173 177.114.134.146 114.33.206.143 116.199.243.170
107.124.61.102 154.180.216.74 199.249.230.157 217.168.144.81
216.48.66.60 6.6.101.195 117.50.48.238 62.210.180.62
157.18.77.179 77.42.77.13 61.97.235.14 27.152.76.152
14.183.117.137 190.77.95.91 43.226.156.236 27.78.71.238