Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: KT Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Web App Attack
2019-08-30 08:23:40
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.149.7.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25425
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.149.7.22.			IN	A

;; AUTHORITY SECTION:
.			2757	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082901 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 30 08:23:33 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 22.7.149.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 22.7.149.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.196.61.1 attackbots
Oct  8 11:07:18 db sshd[18574]: Invalid user pi from 175.196.61.1 port 33428
...
2020-10-08 17:36:25
185.220.102.243 attackspam
$f2bV_matches
2020-10-08 17:38:59
112.85.42.190 attackbots
2020-10-08T09:37:01.198469shield sshd\[26295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.190  user=root
2020-10-08T09:37:03.179901shield sshd\[26295\]: Failed password for root from 112.85.42.190 port 16564 ssh2
2020-10-08T09:37:06.142341shield sshd\[26295\]: Failed password for root from 112.85.42.190 port 16564 ssh2
2020-10-08T09:37:08.851719shield sshd\[26295\]: Failed password for root from 112.85.42.190 port 16564 ssh2
2020-10-08T09:37:11.638510shield sshd\[26295\]: Failed password for root from 112.85.42.190 port 16564 ssh2
2020-10-08 17:56:32
51.77.230.49 attackbots
$f2bV_matches
2020-10-08 17:57:15
41.139.11.150 attackspambots
Autoban   41.139.11.150 AUTH/CONNECT
2020-10-08 17:35:42
212.83.141.237 attackspambots
Oct  7 23:43:07 markkoudstaal sshd[10159]: Failed password for root from 212.83.141.237 port 44320 ssh2
Oct  7 23:45:54 markkoudstaal sshd[10864]: Failed password for root from 212.83.141.237 port 39962 ssh2
...
2020-10-08 17:46:02
51.68.227.98 attackbots
Repeated brute force against a port
2020-10-08 18:00:18
49.233.90.66 attackbots
Oct  8 10:54:22 host1 sshd[1549259]: Failed password for root from 49.233.90.66 port 58946 ssh2
Oct  8 10:59:43 host1 sshd[1549692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.66  user=root
Oct  8 10:59:45 host1 sshd[1549692]: Failed password for root from 49.233.90.66 port 59268 ssh2
Oct  8 10:59:43 host1 sshd[1549692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.66  user=root
Oct  8 10:59:45 host1 sshd[1549692]: Failed password for root from 49.233.90.66 port 59268 ssh2
...
2020-10-08 17:54:15
107.180.120.52 attackspam
Automatic report - Banned IP Access
2020-10-08 17:57:45
80.7.188.191 attackbots
Attempts against non-existent wp-login
2020-10-08 17:51:03
197.39.53.66 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-08 17:42:35
83.240.242.218 attack
SSH bruteforce
2020-10-08 17:50:46
121.229.20.84 attackspambots
20 attempts against mh-ssh on echoip
2020-10-08 17:31:39
36.148.12.251 attack
Brute force attempt
2020-10-08 17:54:30
113.105.66.154 attackbots
Port scan: Attack repeated for 24 hours
2020-10-08 17:54:50

Recently Reported IPs

27.220.74.245 35.198.170.210 78.186.46.58 45.165.48.2
78.188.110.144 113.186.126.20 200.138.50.139 181.28.94.205
77.71.62.220 173.113.88.131 106.227.142.113 124.155.1.98
220.210.106.114 157.109.118.147 126.45.136.70 255.164.239.53
70.57.44.253 255.86.157.70 12.201.220.245 173.112.147.47