Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.189.49.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50308
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.189.49.85.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 14 02:41:48 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 85.49.189.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 85.49.189.121.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
118.40.248.20 attackspambots
Invalid user market from 118.40.248.20 port 42505
2020-06-23 06:02:37
94.179.161.143 attackspambots
445/tcp
[2020-06-22]1pkt
2020-06-23 06:25:37
181.226.213.149 attack
Attempts against non-existent wp-login
2020-06-23 06:29:22
59.98.231.96 attack
23/tcp
[2020-06-22]1pkt
2020-06-23 06:13:13
91.154.91.182 attackbotsspam
23/tcp
[2020-06-22]1pkt
2020-06-23 06:28:18
88.199.42.151 attackbots
8080/tcp
[2020-06-22]1pkt
2020-06-23 05:59:45
68.201.239.63 attackspam
8443/tcp
[2020-06-22]1pkt
2020-06-23 06:34:36
222.186.175.202 attackbots
Jun 22 23:51:31 ArkNodeAT sshd\[30074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Jun 22 23:51:33 ArkNodeAT sshd\[30074\]: Failed password for root from 222.186.175.202 port 42748 ssh2
Jun 22 23:51:45 ArkNodeAT sshd\[30074\]: Failed password for root from 222.186.175.202 port 42748 ssh2
2020-06-23 06:00:51
35.187.220.55 attack
$f2bV_matches
2020-06-23 06:03:44
125.227.236.60 attackbotsspam
215. On Jun 22 2020 experienced a Brute Force SSH login attempt -> 36 unique times by 125.227.236.60.
2020-06-23 06:12:52
222.186.175.148 attack
Jun 23 00:23:42 pve1 sshd[26405]: Failed password for root from 222.186.175.148 port 7046 ssh2
Jun 23 00:23:46 pve1 sshd[26405]: Failed password for root from 222.186.175.148 port 7046 ssh2
...
2020-06-23 06:32:15
132.232.68.26 attackspam
2020-06-22T16:11:31.2731181495-001 sshd[19913]: Failed password for root from 132.232.68.26 port 45964 ssh2
2020-06-22T16:14:11.4547171495-001 sshd[19983]: Invalid user odoo from 132.232.68.26 port 55792
2020-06-22T16:14:11.4628501495-001 sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.26
2020-06-22T16:14:11.4547171495-001 sshd[19983]: Invalid user odoo from 132.232.68.26 port 55792
2020-06-22T16:14:13.8435141495-001 sshd[19983]: Failed password for invalid user odoo from 132.232.68.26 port 55792 ssh2
2020-06-22T16:16:44.2581841495-001 sshd[20068]: Invalid user mo from 132.232.68.26 port 37416
...
2020-06-23 06:10:09
106.12.222.209 attack
Jun 22 14:09:32 mockhub sshd[26343]: Failed password for root from 106.12.222.209 port 39534 ssh2
...
2020-06-23 06:05:47
190.196.71.98 attack
fail2ban
2020-06-23 06:26:25
206.189.132.130 attackspambots
Invalid user user1 from 206.189.132.130 port 47550
2020-06-23 06:09:35

Recently Reported IPs

49.57.192.242 203.66.34.104 95.25.242.8 2.235.145.91
201.244.159.178 213.6.254.203 138.169.71.32 52.67.114.101
185.160.156.149 90.223.159.225 139.99.137.154 200.250.95.75
91.229.64.168 166.41.63.116 137.190.223.114 94.222.41.71
101.175.51.163 177.56.206.31 109.65.112.213 111.233.202.140