Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daegu

Region: Daegu

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.182.148.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9755
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.182.148.16.			IN	A

;; AUTHORITY SECTION:
.			2315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 06:41:26 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 16.148.182.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 16.148.182.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.60.155.86 attackspambots
Jul  7 19:07:55 web1 postfix/smtpd[16891]: warning: 187-60-155-86.pppoe.micropic.com.br[187.60.155.86]: SASL PLAIN authentication failed: authentication failure
...
2019-07-08 10:00:47
205.204.23.66 attackspambots
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-08 01:07:28]
2019-07-08 09:57:39
167.99.47.85 attackbots
" "
2019-07-08 09:24:07
82.64.80.109 attackbots
/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1
2019-07-08 09:34:23
162.243.151.186 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-08 09:15:14
45.40.198.41 attackbots
Tried sshing with brute force.
2019-07-08 09:47:15
139.199.213.40 attackspam
Jul  8 01:08:19 dedicated sshd[9954]: Invalid user tomee from 139.199.213.40 port 34172
Jul  8 01:08:19 dedicated sshd[9954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.213.40
Jul  8 01:08:19 dedicated sshd[9954]: Invalid user tomee from 139.199.213.40 port 34172
Jul  8 01:08:22 dedicated sshd[9954]: Failed password for invalid user tomee from 139.199.213.40 port 34172 ssh2
Jul  8 01:09:10 dedicated sshd[10034]: Invalid user nagios from 139.199.213.40 port 41864
2019-07-08 09:39:18
185.97.201.76 attackbotsspam
WordPress wp-login brute force :: 185.97.201.76 0.080 BYPASS [08/Jul/2019:09:08:54  1000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 3538 "https://[censored_4]/wp-login.php" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0"
2019-07-08 09:43:37
112.85.42.182 attackspam
Jul  7 20:33:07 localhost sshd[14560]: Failed password for root from 112.85.42.182 port 1824 ssh2
Jul  7 20:33:11 localhost sshd[14560]: Failed password for root from 112.85.42.182 port 1824 ssh2
Jul  7 20:33:13 localhost sshd[14560]: Failed password for root from 112.85.42.182 port 1824 ssh2
Jul  7 20:33:16 localhost sshd[14560]: Failed password for root from 112.85.42.182 port 1824 ssh2
Jul  7 20:33:19 localhost sshd[14560]: Failed password for root from 112.85.42.182 port 1824 ssh2
...
2019-07-08 09:54:17
51.68.230.54 attack
Jul  8 03:22:04 ns3367391 sshd\[14914\]: Invalid user uta from 51.68.230.54 port 41142
Jul  8 03:22:05 ns3367391 sshd\[14914\]: Failed password for invalid user uta from 51.68.230.54 port 41142 ssh2
...
2019-07-08 09:31:53
176.192.229.192 attack
Jul  5 07:12:48 our-server-hostname postfix/smtpd[15532]: connect from unknown[176.192.229.192]
Jul x@x
Jul  5 07:12:50 our-server-hostname postfix/smtpd[15532]: lost connection after RCPT from unknown[176.192.229.192]
Jul  5 07:12:50 our-server-hostname postfix/smtpd[15532]: disconnect from unknown[176.192.229.192]
Jul  5 07:17:18 our-server-hostname postfix/smtpd[15393]: connect from unknown[176.192.229.192]
Jul x@x
Jul  5 07:17:19 our-server-hostname postfix/smtpd[15393]: lost connection after RCPT from unknown[176.192.229.192]
Jul  5 07:17:19 our-server-hostname postfix/smtpd[15393]: disconnect from unknown[176.192.229.192]
Jul  5 07:21:59 our-server-hostname postfix/smtpd[18483]: connect from unknown[176.192.229.192]
Jul x@x
Jul  5 07:22:00 our-server-hostname postfix/smtpd[18483]: lost connection after RCPT from unknown[176.192.229.192]
Jul  5 07:22:00 our-server-hostname postfix/smtpd[18483]: disconnect from unknown[176.192.229.192]
Jul  5 07:28:38 our-server-hos........
-------------------------------
2019-07-08 09:18:59
139.59.25.252 attackspambots
Jul  8 01:09:27 vmd17057 sshd\[25659\]: Invalid user martins from 139.59.25.252 port 45116
Jul  8 01:09:27 vmd17057 sshd\[25659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.252
Jul  8 01:09:29 vmd17057 sshd\[25659\]: Failed password for invalid user martins from 139.59.25.252 port 45116 ssh2
...
2019-07-08 09:35:43
129.204.47.217 attackbotsspam
v+ssh-bruteforce
2019-07-08 10:03:10
121.67.246.139 attackbots
07.07.2019 23:39:33 SSH access blocked by firewall
2019-07-08 10:01:48
167.114.97.191 attack
Jul  2 02:27:58 xxxxxxx9247313 sshd[29439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-167-114-97.net  user=r.r
Jul  2 02:28:01 xxxxxxx9247313 sshd[29439]: Failed password for r.r from 167.114.97.191 port 54592 ssh2
Jul  2 02:28:01 xxxxxxx9247313 sshd[29440]: Received disconnect from 167.114.97.191: 3: com.jcraft.jsch.JSchException: Auth fail
Jul  2 02:28:01 xxxxxxx9247313 sshd[29441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-167-114-97.net  user=r.r
Jul  2 02:28:03 xxxxxxx9247313 sshd[29441]: Failed password for r.r from 167.114.97.191 port 54808 ssh2
Jul  2 02:28:03 xxxxxxx9247313 sshd[29442]: Received disconnect from 167.114.97.191: 3: com.jcraft.jsch.JSchException: Auth fail
Jul  2 02:28:03 xxxxxxx9247313 sshd[29443]: Invalid user pi from 167.114.97.191
Jul  2 02:28:03 xxxxxxx9247313 sshd[29443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........
------------------------------
2019-07-08 09:23:41

Recently Reported IPs

80.132.153.47 183.250.160.58 185.7.78.31 180.126.78.55
177.133.32.127 179.48.137.105 42.112.56.55 61.132.42.50
130.87.193.126 61.94.40.245 218.225.176.152 51.37.31.61
180.131.19.43 52.81.98.88 186.219.251.42 185.188.99.136
104.234.236.184 38.75.136.125 51.150.138.102 44.187.99.2