Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.149.63.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1455
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.149.63.220.			IN	A

;; AUTHORITY SECTION:
.			514	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092000 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 20 22:41:14 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 220.63.149.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.63.149.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.2.121.67 attack
Sent Mail to target address hacked/leaked from Planet3DNow.de
2019-06-22 09:32:48
80.44.119.68 attack
Request: "GET / HTTP/1.1"
2019-06-22 09:33:11
192.241.204.44 attackbotsspam
¯\_(ツ)_/¯
2019-06-22 10:12:26
93.174.95.106 attackspam
21.06.2019 23:49:45 Connection to port 8038 blocked by firewall
2019-06-22 09:47:54
103.99.101.251 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 09:59:20
127.0.0.1 attack
crack the code/NS/illegal networks BT/SET up by bt /AKAMAIHD.NET/-TV TAMPERING/AS With the duplication of this site/inverness online kenable -my developer because they can -/cat and radio 2007 radio 433-previous owner neighbour partial to Wednesday wandering -ex army-gstatic in
2019-06-22 09:55:54
211.141.155.131 attackbotsspam
Brute force attempt
2019-06-22 09:45:55
39.69.71.200 attack
DATE:2019-06-21_21:38:44, IP:39.69.71.200, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-22 10:09:46
201.0.24.252 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 10:08:34
125.161.51.161 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 09:40:36
85.214.254.236 attack
Request: "POST /wp-login.php?action=lostpassword HTTP/1.1" Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1" Request: "GET /wp-content/plugins/convertplug/framework/assets/css/style.css HTTP/1.1" Bad Request: "POST /wp-admin/admin-ajax.php HTTP/1.1" Bad Request: "POST /wp-admin/admin-ajax.php?action=cp_add_subscriber HTTP/1.1" Request: "POST /wp-login.php?action=lostpassword HTTP/1.1" Request: "GET / HTTP/1.1" Request: "GET / HTTP/1.1" Request: "GET /wp-content/plugins/convertplug/framework/assets/css/style.css HTTP/1.1" Bad Request: "GET /wp-admin/admin-ajax.php HTTP/1.1" Bad Request: "GET /wp-admin/admin-ajax.php?action=cp_add_subscriber HTTP/1.1" Request: "GET / HTTP/1.1"
2019-06-22 10:20:32
101.64.38.169 attackbots
Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1" Request: "POST /wp-login.php HTTP/1.1"
2019-06-22 10:20:03
54.87.231.218 attack
Request: "OPTIONS / HTTP/1.1"
2019-06-22 09:48:18
177.125.44.180 attack
Request: "GET / HTTP/1.1"
2019-06-22 09:43:55
179.228.207.33 attackspam
Blocking for trying to access an exploit file: /wp-config.php_bak
2019-06-22 10:19:41

Recently Reported IPs

98.132.61.207 141.105.104.175 121.116.98.130 201.141.166.35
116.74.22.182 209.141.34.104 78.56.108.108 39.53.115.234
27.6.246.167 1.171.98.88 182.116.116.215 106.12.185.102
174.217.19.181 118.100.175.154 46.35.52.172 42.119.59.39
218.153.110.52 114.42.22.41 79.18.88.6 65.39.198.100