Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Goyang-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.161.82.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57617
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.161.82.213.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122800 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 28 16:34:51 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 213.82.161.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.82.161.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.44.50.155 attackspambots
Oct  3 07:59:20 web9 sshd\[30676\]: Invalid user network2 from 200.44.50.155
Oct  3 07:59:20 web9 sshd\[30676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155
Oct  3 07:59:21 web9 sshd\[30676\]: Failed password for invalid user network2 from 200.44.50.155 port 43364 ssh2
Oct  3 08:04:18 web9 sshd\[31415\]: Invalid user db2inst from 200.44.50.155
Oct  3 08:04:18 web9 sshd\[31415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155
2019-10-04 04:17:51
115.159.143.217 attackspam
Oct  3 10:08:18 php1 sshd\[14320\]: Invalid user amy from 115.159.143.217
Oct  3 10:08:18 php1 sshd\[14320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217
Oct  3 10:08:20 php1 sshd\[14320\]: Failed password for invalid user amy from 115.159.143.217 port 54051 ssh2
Oct  3 10:12:53 php1 sshd\[14878\]: Invalid user agnola from 115.159.143.217
Oct  3 10:12:53 php1 sshd\[14878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.143.217
2019-10-04 04:14:39
187.49.83.194 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 03-10-2019 13:20:28.
2019-10-04 04:40:29
152.136.225.47 attackspambots
Oct  3 17:40:10 tux-35-217 sshd\[27767\]: Invalid user ftpuser from 152.136.225.47 port 50794
Oct  3 17:40:10 tux-35-217 sshd\[27767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.225.47
Oct  3 17:40:12 tux-35-217 sshd\[27767\]: Failed password for invalid user ftpuser from 152.136.225.47 port 50794 ssh2
Oct  3 17:46:50 tux-35-217 sshd\[27810\]: Invalid user ubnt from 152.136.225.47 port 34490
Oct  3 17:46:50 tux-35-217 sshd\[27810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.225.47
...
2019-10-04 04:29:29
176.45.171.97 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 03-10-2019 13:20:25.
2019-10-04 04:44:33
150.249.114.20 attackbots
Oct  2 17:01:38 ns341937 sshd[9360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.114.20
Oct  2 17:01:41 ns341937 sshd[9360]: Failed password for invalid user informix from 150.249.114.20 port 40910 ssh2
Oct  2 17:16:27 ns341937 sshd[13742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.114.20
...
2019-10-04 04:07:45
203.186.158.178 attack
$f2bV_matches
2019-10-04 04:29:09
61.134.36.13 attack
Brute force attempt
2019-10-04 04:18:12
70.125.42.101 attackbotsspam
Oct  2 18:28:12 majoron sshd[31887]: Invalid user roby from 70.125.42.101 port 33244
Oct  2 18:28:12 majoron sshd[31887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.125.42.101
Oct  2 18:28:14 majoron sshd[31887]: Failed password for invalid user roby from 70.125.42.101 port 33244 ssh2
Oct  2 18:28:15 majoron sshd[31887]: Received disconnect from 70.125.42.101 port 33244:11: Bye Bye [preauth]
Oct  2 18:28:15 majoron sshd[31887]: Disconnected from 70.125.42.101 port 33244 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=70.125.42.101
2019-10-04 04:20:01
104.248.115.231 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-04 04:30:16
92.118.160.57 attack
Unauthorized connection attempt from IP address 92.118.160.57 on Port 139(NETBIOS)
2019-10-04 04:24:00
173.241.21.82 attackspambots
Oct  3 16:49:19 vps01 sshd[14868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82
Oct  3 16:49:21 vps01 sshd[14868]: Failed password for invalid user claudiu from 173.241.21.82 port 39732 ssh2
2019-10-04 04:10:20
159.89.10.77 attackbots
fail2ban auto
2019-10-04 04:27:47
49.207.87.254 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 03-10-2019 13:20:31.
2019-10-04 04:36:43
51.38.129.120 attackbots
$f2bV_matches
2019-10-04 04:42:23

Recently Reported IPs

122.236.108.224 117.23.198.12 111.107.6.228 108.125.25.197
37.114.56.16 99.9.101.149 85.62.165.150 93.205.13.146
81.147.249.208 95.214.121.228 77.228.19.141 67.173.157.232
61.7.168.22 58.34.217.248 5.67.118.168 5.174.191.154
43.68.137.207 37.23.98.81 41.72.250.217 49.221.252.175