Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.189.196.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.189.196.34.			IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 05:13:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 34.196.189.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.196.189.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.165.68.27 attackbots
Unauthorised access (Nov 17) SRC=182.165.68.27 LEN=44 TTL=50 ID=33252 TCP DPT=8080 WINDOW=26234 SYN
2019-11-18 01:46:06
168.128.86.35 attack
Nov 17 18:17:25 vmanager6029 sshd\[13713\]: Invalid user annarbor from 168.128.86.35 port 43646
Nov 17 18:17:25 vmanager6029 sshd\[13713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.86.35
Nov 17 18:17:27 vmanager6029 sshd\[13713\]: Failed password for invalid user annarbor from 168.128.86.35 port 43646 ssh2
2019-11-18 01:48:24
162.144.60.165 attackbotsspam
162.144.60.165 - - \[17/Nov/2019:15:42:44 +0100\] "POST /wp-login.php HTTP/1.0" 200 7538 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.144.60.165 - - \[17/Nov/2019:15:42:52 +0100\] "POST /wp-login.php HTTP/1.0" 200 7363 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.144.60.165 - - \[17/Nov/2019:15:42:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 7358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-18 01:27:08
61.90.110.215 attackbotsspam
Automatic report - Port Scan Attack
2019-11-18 01:44:10
101.36.151.78 attack
Nov 17 18:23:55 sso sshd[25648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.151.78
Nov 17 18:23:56 sso sshd[25648]: Failed password for invalid user schorpp from 101.36.151.78 port 40568 ssh2
...
2019-11-18 01:38:15
122.228.208.113 attack
Port scan: Attack repeated for 24 hours
2019-11-18 01:16:55
101.89.151.127 attackspam
Nov 17 17:03:37 localhost sshd\[2768\]: Invalid user bull from 101.89.151.127 port 57708
Nov 17 17:03:37 localhost sshd\[2768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.151.127
Nov 17 17:03:39 localhost sshd\[2768\]: Failed password for invalid user bull from 101.89.151.127 port 57708 ssh2
Nov 17 17:07:46 localhost sshd\[2868\]: Invalid user lisa from 101.89.151.127 port 46338
Nov 17 17:07:46 localhost sshd\[2868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.151.127
...
2019-11-18 01:11:30
185.234.218.210 attackbots
Nov 17 17:39:54 srv01 postfix/smtpd\[12146\]: warning: unknown\[185.234.218.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 17:40:01 srv01 postfix/smtpd\[12146\]: warning: unknown\[185.234.218.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 17:51:39 srv01 postfix/smtpd\[12146\]: warning: unknown\[185.234.218.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 17:52:37 srv01 postfix/smtpd\[12146\]: warning: unknown\[185.234.218.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 17 17:59:22 srv01 postfix/smtpd\[12146\]: warning: unknown\[185.234.218.210\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-18 01:24:50
51.15.112.47 attack
404 NOT FOUND
2019-11-18 01:39:46
210.19.105.147 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-18 01:10:34
198.108.67.79 attackspambots
Port 1080 Scan
2019-11-18 01:23:40
79.137.73.253 attack
Nov 17 15:00:37 thevastnessof sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253
...
2019-11-18 01:20:15
89.248.168.170 attackspambots
11/17/2019-09:42:18.793558 89.248.168.170 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-18 01:48:04
68.183.160.63 attackbots
2019-11-17T17:41:49.774324abusebot-6.cloudsearch.cf sshd\[16370\]: Invalid user nalin from 68.183.160.63 port 59270
2019-11-18 01:43:44
222.186.180.147 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Failed password for root from 222.186.180.147 port 20690 ssh2
Failed password for root from 222.186.180.147 port 20690 ssh2
Failed password for root from 222.186.180.147 port 20690 ssh2
Failed password for root from 222.186.180.147 port 20690 ssh2
2019-11-18 01:15:37

Recently Reported IPs

35.86.232.240 121.181.243.138 123.195.85.180 103.247.7.169
128.90.5.192 95.164.235.136 47.254.69.166 51.89.138.188
121.167.77.194 101.36.121.173 175.201.146.74 201.148.186.9
118.99.96.26 54.37.74.123 47.107.244.76 192.3.227.5
5.62.63.162 35.216.132.205 119.94.27.99 128.90.59.2