Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wonju

Region: Gangwon-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.158.12.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.158.12.66.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 03 16:05:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 66.12.158.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.12.158.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.218 attackbots
744/tcp 142/tcp 756/tcp...
[2019-12-24/2020-02-01]305pkt,286pt.(tcp)
2020-02-02 00:15:23
147.135.168.173 attackspambots
...
2020-02-02 00:31:45
89.42.252.124 attackspam
Unauthorized connection attempt detected from IP address 89.42.252.124 to port 2220 [J]
2020-02-02 00:03:55
185.39.10.25 attackspambots
152/tcp 201/tcp 142/tcp...
[2019-12-24/2020-02-01]247pkt,244pt.(tcp)
2020-02-02 00:05:27
148.70.113.96 attack
Unauthorized connection attempt detected from IP address 148.70.113.96 to port 2220 [J]
2020-02-01 23:51:11
168.0.237.125 attack
20/2/1@08:36:06: FAIL: Alarm-Network address from=168.0.237.125
20/2/1@08:36:07: FAIL: Alarm-Network address from=168.0.237.125
...
2020-02-02 00:26:11
192.3.25.92 attackbots
Feb  1 05:32:54 web1 sshd\[19826\]: Invalid user userftp from 192.3.25.92
Feb  1 05:32:54 web1 sshd\[19826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92
Feb  1 05:32:55 web1 sshd\[19826\]: Failed password for invalid user userftp from 192.3.25.92 port 51058 ssh2
Feb  1 05:41:31 web1 sshd\[20103\]: Invalid user test from 192.3.25.92
Feb  1 05:41:31 web1 sshd\[20103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.25.92
2020-02-02 00:04:59
147.135.119.51 attackspam
...
2020-02-02 00:37:03
221.229.250.19 attackbots
Unauthorized connection attempt detected from IP address 221.229.250.19 to port 1433 [J]
2020-02-01 23:50:26
65.49.22.171 attack
4567/tcp 4567/tcp 4567/tcp
[2019-12-29/2020-02-01]3pkt
2020-02-02 00:25:01
139.59.190.69 attack
Unauthorized connection attempt detected from IP address 139.59.190.69 to port 2220 [J]
2020-02-02 00:27:28
182.176.88.41 attack
Feb  1 15:28:50 dev0-dcde-rnet sshd[16821]: Failed password for root from 182.176.88.41 port 33412 ssh2
Feb  1 15:35:20 dev0-dcde-rnet sshd[16836]: Failed password for root from 182.176.88.41 port 51464 ssh2
Feb  1 15:35:30 dev0-dcde-rnet sshd[16841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.88.41
2020-02-02 00:22:14
92.222.136.169 attackbots
2020-02-01T10:37:29.400769vostok sshd\[18943\]: Invalid user thuntington from 92.222.136.169 port 58506
2020-02-01T10:37:29.403998vostok sshd\[18943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=blog.minable.xyz | Triggered by Fail2Ban at Vostok web server
2020-02-02 00:20:22
147.135.255.107 attackspam
...
2020-02-02 00:29:42
147.139.162.29 attack
...
2020-02-02 00:22:57

Recently Reported IPs

154.38.118.168 106.246.240.90 81.224.139.66 1.197.91.5
14.45.211.251 104.168.126.45 155.254.29.164 181.174.224.96
104.183.103.100 76.74.27.72 35.233.45.178 46.29.77.70
122.116.171.94 59.126.107.110 92.114.220.178 107.172.105.216
8.24.176.125 104.248.247.9 189.216.168.3 59.120.4.57