Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.149.53.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.149.53.246.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052401 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 25 06:35:48 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 246.53.149.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 246.53.149.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.79.90.70 attackspambots
SSH-BruteForce
2020-02-03 07:57:33
144.139.218.21 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 02-02-2020 23:30:13.
2020-02-03 08:11:57
162.243.128.224 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-03 08:11:10
104.244.78.205 attack
firewall-block, port(s): 22/tcp
2020-02-03 08:15:00
80.82.65.82 attackbots
02/03/2020-00:37:23.032565 80.82.65.82 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-03 08:19:38
125.17.144.51 attackbotsspam
Unauthorized connection attempt from IP address 125.17.144.51 on Port 445(SMB)
2020-02-03 08:12:40
104.236.175.127 attackbots
Unauthorized connection attempt detected from IP address 104.236.175.127 to port 2220 [J]
2020-02-03 07:51:17
185.209.0.19 attack
ET DROP Dshield Block Listed Source group 1 - port: 3392 proto: TCP cat: Misc Attack
2020-02-03 07:56:10
117.221.80.43 attack
Unauthorized connection attempt from IP address 117.221.80.43 on Port 445(SMB)
2020-02-03 08:01:28
103.121.117.181 attackspam
Invalid user kulavardhini from 103.121.117.181 port 62558
2020-02-03 08:09:49
14.175.34.234 attackbotsspam
Unauthorized connection attempt from IP address 14.175.34.234 on Port 445(SMB)
2020-02-03 07:59:46
36.80.218.9 attackspambots
Unauthorized connection attempt from IP address 36.80.218.9 on Port 445(SMB)
2020-02-03 08:00:58
13.76.190.246 attackbotsspam
Invalid user prajnendra from 13.76.190.246 port 52210
2020-02-03 08:23:10
185.53.88.123 attack
Triggered: repeated knocking on closed ports.
2020-02-03 08:24:44
49.88.112.62 attackbots
Failed password for root from 49.88.112.62 port 26678 ssh2
Failed password for root from 49.88.112.62 port 26678 ssh2
Failed password for root from 49.88.112.62 port 26678 ssh2
Failed password for root from 49.88.112.62 port 26678 ssh2
2020-02-03 08:20:59

Recently Reported IPs

48.70.161.19 33.145.169.97 212.250.245.191 204.74.143.129
20.230.37.204 31.152.115.125 142.78.204.97 150.186.128.148
23.242.173.104 239.10.206.98 122.23.198.150 229.223.239.141
41.219.146.198 109.226.210.154 189.55.23.100 65.83.23.213
58.234.144.172 10.95.63.90 159.199.212.147 89.238.52.252