Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.199.48.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.199.48.10.			IN	A

;; AUTHORITY SECTION:
.			241	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 20:04:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 10.48.199.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 10.48.199.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.122.134.228 attackbotsspam
2020-08-05T17:57:01.778475ns385565 sshd[15691]: Connection closed by 134.122.134.228 port 2923 [preauth]
2020-08-06T00:56:52.716092ns385565 sshd[18059]: Connection closed by 134.122.134.228 port 13827 [preauth]
2020-08-06T10:52:22.252610ns385565 sshd[3047]: Connection closed by 134.122.134.228 port 18441 [preauth]
...
2020-08-06 20:21:56
157.34.58.93 attack
IP 157.34.58.93 attacked honeypot on port: 5000 at 8/5/2020 10:17:13 PM
2020-08-06 20:18:45
139.59.12.65 attack
Aug  6 08:26:52 ip106 sshd[8995]: Failed password for root from 139.59.12.65 port 34618 ssh2
...
2020-08-06 19:58:58
106.75.53.49 attackspambots
firewall-block, port(s): 4923/tcp
2020-08-06 20:24:26
14.232.208.109 attackbots
20/8/6@01:18:14: FAIL: Alarm-Intrusion address from=14.232.208.109
...
2020-08-06 20:05:51
51.91.120.67 attackbotsspam
2020-08-06T11:09:03.540705shield sshd\[9595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-51-91-120.eu  user=root
2020-08-06T11:09:06.034854shield sshd\[9595\]: Failed password for root from 51.91.120.67 port 33160 ssh2
2020-08-06T11:13:04.887286shield sshd\[10079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-51-91-120.eu  user=root
2020-08-06T11:13:06.803249shield sshd\[10079\]: Failed password for root from 51.91.120.67 port 44670 ssh2
2020-08-06T11:17:10.350107shield sshd\[10385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-51-91-120.eu  user=root
2020-08-06 19:53:50
180.248.14.52 attack
Port Scan
...
2020-08-06 19:58:10
5.62.20.31 attackbotsspam
(From ewan.morrill@yahoo.com) Are You interested in advertising that charges less than $49 monthly and delivers thousands of people who are ready to buy directly to your website? Check out: https://bit.ly/buy-more-visitors
2020-08-06 20:01:27
101.109.184.181 attack
1596691059 - 08/06/2020 07:17:39 Host: 101.109.184.181/101.109.184.181 Port: 445 TCP Blocked
2020-08-06 20:29:42
211.103.183.3 attackbotsspam
firewall-block, port(s): 26439/tcp
2020-08-06 20:06:27
49.232.34.247 attack
<6 unauthorized SSH connections
2020-08-06 19:49:59
200.188.19.33 attackbotsspam
 TCP (SYN) 200.188.19.33:8014 -> port 1433, len 44
2020-08-06 20:28:44
208.109.52.183 attackbotsspam
208.109.52.183 - - \[06/Aug/2020:09:52:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 6524 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
208.109.52.183 - - \[06/Aug/2020:09:52:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 6526 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
208.109.52.183 - - \[06/Aug/2020:09:52:13 +0200\] "POST /wp-login.php HTTP/1.0" 200 6382 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-06 20:07:50
60.206.36.157 attack
$f2bV_matches
2020-08-06 20:19:56
222.124.77.179 attackbots
Automatic report - Port Scan Attack
2020-08-06 19:52:50

Recently Reported IPs

121.199.46.139 121.199.56.164 121.199.65.242 121.199.65.41
121.199.82.10 121.20.62.158 121.20.95.231 121.20.96.116
121.20.96.75 121.20.96.88 121.200.1.226 121.200.247.136
121.205.12.95 121.205.124.210 121.205.124.64 121.205.128.215
121.205.13.104 121.205.13.106 121.205.13.12 121.205.13.122