Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.190.248.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36614
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.190.248.30.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062801 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 29 02:21:04 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 30.248.190.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 30.248.190.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.215.219.118 attack
2020-01-05T04:19:07.117Z CLOSE host=58.215.219.118 port=6410 fd=4 time=20.013 bytes=32
...
2020-03-13 02:56:33
2.42.210.104 attack
Port probing on unauthorized port 88
2020-03-13 02:44:04
91.117.140.36 attackbotsspam
firewall-block, port(s): 59548/udp
2020-03-13 02:56:08
185.102.219.171 attackspam
Malicious Traffic/Form Submission
2020-03-13 03:02:39
61.94.143.232 attackbots
2019-11-05T14:12:39.993Z CLOSE host=61.94.143.232 port=49286 fd=4 time=20.008 bytes=4
...
2020-03-13 02:29:45
61.153.54.38 attack
'IP reached maximum auth failures for a one day block'
2020-03-13 02:56:51
51.89.23.22 attack
2020-02-21T00:58:39.091Z CLOSE host=51.89.23.22 port=50868 fd=4 time=20.006 bytes=8
...
2020-03-13 03:03:39
35.225.211.131 attackspam
xmlrpc attack
2020-03-13 02:31:31
132.255.216.123 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 02:45:10
185.175.93.17 attack
03/12/2020-12:02:55.561782 185.175.93.17 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-13 02:58:36
54.38.188.34 attack
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:04 tuxlinux sshd[24372]: Failed password for invalid user eric from 54.38.188.34 port 36370 ssh2
...
2020-03-13 02:46:51
60.172.95.182 attack
2019-11-26T06:52:19.273Z CLOSE host=60.172.95.182 port=43437 fd=4 time=20.020 bytes=7
...
2020-03-13 02:43:10
91.109.4.48 attackspam
firewall-block, port(s): 1991/tcp
2020-03-13 02:59:06
206.189.188.223 attackbots
Invalid user user from 206.189.188.223 port 57596
2020-03-13 02:30:38
54.36.54.24 attackbots
port
2020-03-13 02:54:52

Recently Reported IPs

138.97.225.84 190.207.238.91 24.119.234.172 1.172.94.106
97.183.5.185 2.224.243.193 133.167.118.134 62.77.104.254
52.196.173.185 88.9.141.172 76.1.238.171 77.159.91.207
89.33.140.81 122.170.157.246 125.188.3.172 36.226.22.45
13.26.254.113 215.82.191.200 60.22.177.218 35.231.135.46