Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.151.164.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.151.164.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 15:08:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 21.164.151.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.164.151.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.30.166 attack
Nov 17 06:58:16 vmanager6029 sshd\[30374\]: Invalid user dilly from 80.211.30.166 port 60810
Nov 17 06:58:16 vmanager6029 sshd\[30374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.30.166
Nov 17 06:58:18 vmanager6029 sshd\[30374\]: Failed password for invalid user dilly from 80.211.30.166 port 60810 ssh2
2019-11-17 14:04:37
220.92.16.86 attackbots
Invalid user deploy from 220.92.16.86 port 52640
2019-11-17 14:17:04
113.72.24.254 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/113.72.24.254/ 
 
 CN - 1H : (669)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 113.72.24.254 
 
 CIDR : 113.64.0.0/11 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 11 
  3H - 43 
  6H - 69 
 12H - 141 
 24H - 274 
 
 DateTime : 2019-11-17 05:57:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 13:56:50
104.250.34.5 attackspam
Nov 17 05:38:40 ns382633 sshd\[3903\]: Invalid user create from 104.250.34.5 port 14800
Nov 17 05:38:40 ns382633 sshd\[3903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.5
Nov 17 05:38:41 ns382633 sshd\[3903\]: Failed password for invalid user create from 104.250.34.5 port 14800 ssh2
Nov 17 05:57:21 ns382633 sshd\[7782\]: Invalid user arri from 104.250.34.5 port 59924
Nov 17 05:57:21 ns382633 sshd\[7782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.5
2019-11-17 13:55:51
185.76.34.87 attackspam
Invalid user ts3user from 185.76.34.87 port 52932
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.76.34.87
Failed password for invalid user ts3user from 185.76.34.87 port 52932 ssh2
Invalid user guest from 185.76.34.87 port 60976
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.76.34.87
2019-11-17 14:12:31
107.182.187.34 attackspambots
Automatic report - Banned IP Access
2019-11-17 13:53:53
36.36.200.181 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-11-17 13:38:16
222.120.192.122 attackbotsspam
Invalid user dev from 222.120.192.122 port 37172
2019-11-17 14:19:39
168.232.163.250 attackbotsspam
Nov 16 19:40:59 eddieflores sshd\[7324\]: Invalid user nyx from 168.232.163.250
Nov 16 19:40:59 eddieflores sshd\[7324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.163.250
Nov 16 19:41:01 eddieflores sshd\[7324\]: Failed password for invalid user nyx from 168.232.163.250 port 1121 ssh2
Nov 16 19:45:00 eddieflores sshd\[7605\]: Invalid user melviniqui from 168.232.163.250
Nov 16 19:45:00 eddieflores sshd\[7605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.163.250
2019-11-17 14:09:15
41.131.119.107 attackbotsspam
Nov 17 11:55:38 itv-usvr-01 sshd[19824]: Invalid user abigail from 41.131.119.107
Nov 17 11:55:38 itv-usvr-01 sshd[19824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.131.119.107
Nov 17 11:55:38 itv-usvr-01 sshd[19824]: Invalid user abigail from 41.131.119.107
Nov 17 11:55:41 itv-usvr-01 sshd[19824]: Failed password for invalid user abigail from 41.131.119.107 port 49640 ssh2
Nov 17 11:57:17 itv-usvr-01 sshd[19882]: Invalid user rudolfo from 41.131.119.107
2019-11-17 13:49:58
178.32.161.90 attack
Nov 17 05:22:32 web8 sshd\[18279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.161.90  user=root
Nov 17 05:22:35 web8 sshd\[18279\]: Failed password for root from 178.32.161.90 port 37618 ssh2
Nov 17 05:26:12 web8 sshd\[20649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.161.90  user=man
Nov 17 05:26:14 web8 sshd\[20649\]: Failed password for man from 178.32.161.90 port 56515 ssh2
Nov 17 05:30:15 web8 sshd\[22501\]: Invalid user pcap from 178.32.161.90
Nov 17 05:30:15 web8 sshd\[22501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.161.90
2019-11-17 13:39:40
37.59.58.142 attackbotsspam
Invalid user siaud from 37.59.58.142 port 60164
2019-11-17 14:06:50
188.209.52.164 attackspambots
Automatic report - Port Scan Attack
2019-11-17 13:50:45
129.204.201.27 attackbotsspam
Nov 17 06:49:46 OPSO sshd\[17608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.201.27  user=root
Nov 17 06:49:48 OPSO sshd\[17608\]: Failed password for root from 129.204.201.27 port 52760 ssh2
Nov 17 06:54:54 OPSO sshd\[18528\]: Invalid user treann from 129.204.201.27 port 41376
Nov 17 06:54:54 OPSO sshd\[18528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.201.27
Nov 17 06:54:56 OPSO sshd\[18528\]: Failed password for invalid user treann from 129.204.201.27 port 41376 ssh2
2019-11-17 13:55:21
118.168.73.103 attack
Telnet Server BruteForce Attack
2019-11-17 13:46:14

Recently Reported IPs

242.0.169.105 81.156.250.240 245.124.135.184 250.95.60.102
22.63.143.237 173.80.95.251 33.7.244.220 79.153.75.83
34.204.77.254 231.102.69.251 84.242.145.230 227.120.249.91
230.73.192.237 207.213.158.136 153.218.203.142 134.121.253.64
46.186.63.21 31.25.209.158 77.253.27.0 144.34.32.40