Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea, Republic of

Internet Service Provider: KT Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 121.164.145.55 to port 5555 [J]
2020-01-13 02:21:51
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.164.145.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.164.145.55.			IN	A

;; AUTHORITY SECTION:
.			276	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011201 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 02:21:48 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 55.145.164.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.145.164.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.148 attackbotsspam
Feb 24 07:09:01 ift sshd\[49871\]: Failed password for root from 222.186.175.148 port 63078 ssh2Feb 24 07:09:12 ift sshd\[49871\]: Failed password for root from 222.186.175.148 port 63078 ssh2Feb 24 07:09:14 ift sshd\[49871\]: Failed password for root from 222.186.175.148 port 63078 ssh2Feb 24 07:09:20 ift sshd\[49919\]: Failed password for root from 222.186.175.148 port 24528 ssh2Feb 24 07:09:24 ift sshd\[49919\]: Failed password for root from 222.186.175.148 port 24528 ssh2
...
2020-02-24 13:16:32
187.62.219.138 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:43:35
148.243.151.219 attack
Automatic report - Port Scan Attack
2020-02-24 13:07:12
187.190.181.23 attack
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:40:10
202.146.241.14 spam
ENCORE et TOUJOURS les mêmes SOUS MERDE POLLUEURS de la Planète par leurs services au NOM DU FRIC :
officefile.deskonline247@terabit.net and officefile.deskonline247@gmail.com to BURN / CLOSE/ DELETE / STOP IMMEDIATELY for SPAM, PHISHING and at last SCAM !
https://www.mywot.com/scorecard/terabit.net
https://www.mywot.com/scorecard/porkbun.com
https://www.mywot.com/scorecard/pandi.id
https://www.mywot.com/scorecard/net.id
https://www.mywot.com/scorecard/centrin.net.id
https://en.asytech.cn/check-ip/202.146.241.14
2020-02-24 12:55:41
103.111.15.94 attackspambots
C1,WP GET /wp-login.php
2020-02-24 13:14:51
103.139.37.2 attackbotsspam
DATE:2020-02-24 05:59:12, IP:103.139.37.2, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-24 13:13:18
193.56.28.226 attackbotsspam
Feb 24 05:58:41 karger postfix/smtpd[22114]: warning: unknown[193.56.28.226]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 24 05:58:47 karger postfix/smtpd[22114]: warning: unknown[193.56.28.226]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb 24 05:58:57 karger postfix/smtpd[22114]: warning: unknown[193.56.28.226]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-24 13:18:41
112.85.42.172 attackspam
Feb 24 06:07:56 *host* sshd\[13249\]: Unable to negotiate with 112.85.42.172 port 50282: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
2020-02-24 13:09:26
187.18.123.8 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-02-24 09:45:17
103.117.118.138 attackbotsspam
Port probing on unauthorized port 81
2020-02-24 13:02:27
185.39.11.28 attackspam
Feb 24 04:54:11 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=185.39.11.28, lip=192.168.100.101, session=\\
Feb 24 04:58:20 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=185.39.11.28, lip=192.168.100.101, session=\<6uKrYUqfCgC5Jwsc\>\
Feb 24 05:11:30 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=185.39.11.28, lip=192.168.100.101, session=\<7oO6kEqf9AC5Jwsc\>\
Feb 24 05:15:44 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=185.39.11.28, lip=192.168.100.101, session=\\
Feb 24 05:17:40 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=185.39.11.28, lip=192.168.100.101, session=\<3n3NpkqfRAC5Jwsc\>\
Feb 24 05:19
2020-02-24 13:22:53
141.98.10.141 attackspambots
Feb 24 05:18:21 mail postfix/smtpd\[18461\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 05:24:12 mail postfix/smtpd\[18571\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 05:30:03 mail postfix/smtpd\[18816\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb 24 06:05:05 mail postfix/smtpd\[19378\]: warning: unknown\[141.98.10.141\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-24 13:06:53
138.197.105.79 attackbots
SSH attack
2020-02-24 13:19:48
187.125.30.122 attackspambots
445/tcp 445/tcp 445/tcp
[2020-01-15/02-23]3pkt
2020-02-24 09:43:09

Recently Reported IPs

72.67.113.202 69.229.7.137 62.1.31.120 60.183.114.86
50.122.99.242 49.51.161.95 45.168.122.168 45.125.117.97
42.200.103.117 10.255.17.15 5.134.46.43 220.136.5.216
219.73.88.154 201.220.178.104 201.47.169.133 200.146.248.186
200.33.117.103 197.33.98.21 191.8.80.207 189.47.251.185