Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.205.14.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31771
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.205.14.68.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:08:09 CST 2022
;; MSG SIZE  rcvd: 106
Host info
68.14.205.121.in-addr.arpa domain name pointer 68.14.205.121.broad.qz.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.14.205.121.in-addr.arpa	name = 68.14.205.121.broad.qz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.132.115.161 attack
Dec 16 00:50:46 meumeu sshd[20006]: Failed password for root from 5.132.115.161 port 51718 ssh2
Dec 16 00:54:49 meumeu sshd[20649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.132.115.161 
Dec 16 00:54:51 meumeu sshd[20649]: Failed password for invalid user ubnt from 5.132.115.161 port 52678 ssh2
...
2019-12-16 08:02:47
113.141.66.227 attackspam
445/tcp 1433/tcp...
[2019-10-18/12-15]8pkt,2pt.(tcp)
2019-12-16 08:16:05
81.92.149.58 attack
Invalid user head from 81.92.149.58 port 32916
2019-12-16 07:49:25
210.211.101.79 attackspambots
1433/tcp 445/tcp...
[2019-10-18/12-15]8pkt,2pt.(tcp)
2019-12-16 08:17:44
5.211.244.253 attackbots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-12-16 08:06:10
178.62.90.135 attackspam
$f2bV_matches
2019-12-16 08:16:40
130.61.83.71 attackbots
Invalid user tour from 130.61.83.71 port 43109
2019-12-16 07:45:49
106.12.120.19 attack
Dec 16 00:46:09 sd-53420 sshd\[26845\]: Invalid user icaro from 106.12.120.19
Dec 16 00:46:09 sd-53420 sshd\[26845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19
Dec 16 00:46:10 sd-53420 sshd\[26845\]: Failed password for invalid user icaro from 106.12.120.19 port 39932 ssh2
Dec 16 00:51:02 sd-53420 sshd\[28669\]: User root from 106.12.120.19 not allowed because none of user's groups are listed in AllowGroups
Dec 16 00:51:02 sd-53420 sshd\[28669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.120.19  user=root
...
2019-12-16 07:56:34
51.158.25.170 attackbotsspam
51.158.25.170 was recorded 11 times by 11 hosts attempting to connect to the following ports: 5059. Incident counter (4h, 24h, all-time): 11, 19, 285
2019-12-16 08:17:17
175.207.13.200 attack
Dec 16 01:03:28 meumeu sshd[21797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 
Dec 16 01:03:29 meumeu sshd[21797]: Failed password for invalid user guest666 from 175.207.13.200 port 54906 ssh2
Dec 16 01:10:12 meumeu sshd[22821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200 
...
2019-12-16 08:10:15
129.211.26.12 attackspam
Invalid user test from 129.211.26.12 port 51114
2019-12-16 08:04:42
198.108.67.93 attackspambots
Dec 15 23:48:44 debian-2gb-nbg1-2 kernel: \[102912.756466\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.93 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=37 ID=5998 PROTO=TCP SPT=47379 DPT=9096 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-16 08:21:19
54.36.148.10 attackspam
www noscript
...
2019-12-16 08:07:50
113.164.24.10 attack
445/tcp 1433/tcp
[2019-12-06/15]2pkt
2019-12-16 08:07:21
203.196.24.22 attackspam
$f2bV_matches
2019-12-16 07:58:01

Recently Reported IPs

121.205.14.54 121.205.14.73 121.205.14.96 121.205.14.79
121.205.141.18 114.226.77.17 121.205.141.97 121.205.14.74
121.205.15.0 121.205.14.82 121.205.14.77 121.205.143.189
121.205.15.105 121.205.15.109 121.205.15.116 114.227.80.227
121.205.15.128 121.205.15.130 121.205.15.143 121.205.15.123