Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.207.104.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.207.104.142.		IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 20:21:40 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.104.207.121.in-addr.arpa domain name pointer 142.104.207.121.broad.qz.fj.dynamic.163data.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.104.207.121.in-addr.arpa	name = 142.104.207.121.broad.qz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
131.100.76.148 attackbots
SMTP-sasl brute force
...
2019-07-27 04:46:09
216.221.79.110 attack
Jul 26 23:30:10 server sshd\[6782\]: User root from 216.221.79.110 not allowed because listed in DenyUsers
Jul 26 23:30:10 server sshd\[6782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.221.79.110  user=root
Jul 26 23:30:12 server sshd\[6782\]: Failed password for invalid user root from 216.221.79.110 port 60794 ssh2
Jul 26 23:34:27 server sshd\[11753\]: User root from 216.221.79.110 not allowed because listed in DenyUsers
Jul 26 23:34:27 server sshd\[11753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.221.79.110  user=root
2019-07-27 04:37:40
192.144.186.77 attackspambots
2019-07-26T19:52:40.569323abusebot-2.cloudsearch.cf sshd\[17860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.186.77  user=root
2019-07-27 04:31:04
185.246.210.65 attackspam
Jul 26 23:02:56 srv-4 sshd\[18990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.210.65  user=root
Jul 26 23:02:58 srv-4 sshd\[18990\]: Failed password for root from 185.246.210.65 port 46510 ssh2
Jul 26 23:07:11 srv-4 sshd\[19356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.210.65  user=root
...
2019-07-27 04:35:20
183.98.5.113 attackbotsspam
SSH Brute Force
2019-07-27 04:57:10
51.91.249.91 attack
Jul 26 19:43:34 ip-172-31-62-245 sshd\[22949\]: Invalid user tomas from 51.91.249.91\
Jul 26 19:43:35 ip-172-31-62-245 sshd\[22949\]: Failed password for invalid user tomas from 51.91.249.91 port 58458 ssh2\
Jul 26 19:47:45 ip-172-31-62-245 sshd\[22972\]: Failed password for root from 51.91.249.91 port 53360 ssh2\
Jul 26 19:52:17 ip-172-31-62-245 sshd\[22989\]: Invalid user mehdi from 51.91.249.91\
Jul 26 19:52:19 ip-172-31-62-245 sshd\[22989\]: Failed password for invalid user mehdi from 51.91.249.91 port 48268 ssh2\
2019-07-27 04:43:59
85.105.127.247 attackbotsspam
Unauthorised access (Jul 26) SRC=85.105.127.247 LEN=44 TTL=49 ID=5394 TCP DPT=23 WINDOW=42148 SYN
2019-07-27 04:40:20
139.59.105.141 attackbotsspam
Jul 26 21:34:37 server sshd[20884]: Failed password for root from 139.59.105.141 port 48488 ssh2
Jul 26 21:47:23 server sshd[22153]: Failed password for root from 139.59.105.141 port 39986 ssh2
Jul 26 21:52:21 server sshd[22574]: Failed password for root from 139.59.105.141 port 34254 ssh2
2019-07-27 04:39:33
164.164.116.98 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 17:20:40,799 INFO [shellcode_manager] (164.164.116.98) no match, writing hexdump (e15d10a1210256fda20eba22c58fedec :2264529) - MS17010 (EternalBlue)
2019-07-27 05:14:35
144.217.0.35 attackbotsspam
(sshd) Failed SSH login from 144.217.0.35 (ddos-protected.by.heavyhost.net): 5 in the last 3600 secs
2019-07-27 04:30:38
138.68.185.126 attack
Jul 26 21:37:54 Ubuntu-1404-trusty-64-minimal sshd\[6669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.185.126  user=root
Jul 26 21:37:56 Ubuntu-1404-trusty-64-minimal sshd\[6669\]: Failed password for root from 138.68.185.126 port 44724 ssh2
Jul 26 21:48:13 Ubuntu-1404-trusty-64-minimal sshd\[12172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.185.126  user=root
Jul 26 21:48:15 Ubuntu-1404-trusty-64-minimal sshd\[12172\]: Failed password for root from 138.68.185.126 port 38484 ssh2
Jul 26 21:52:18 Ubuntu-1404-trusty-64-minimal sshd\[15910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.185.126  user=root
2019-07-27 04:44:15
116.203.180.56 attackbotsspam
Jul 26 21:43:04 MainVPS sshd[15606]: Invalid user server from 116.203.180.56 port 53144
Jul 26 21:43:04 MainVPS sshd[15606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.203.180.56
Jul 26 21:43:04 MainVPS sshd[15606]: Invalid user server from 116.203.180.56 port 53144
Jul 26 21:43:06 MainVPS sshd[15606]: Failed password for invalid user server from 116.203.180.56 port 53144 ssh2
Jul 26 21:51:41 MainVPS sshd[16204]: Invalid user user from 116.203.180.56 port 49490
...
2019-07-27 05:08:32
192.99.245.135 attackspambots
Jul 26 20:47:07 MK-Soft-VM4 sshd\[3027\]: Invalid user ariel from 192.99.245.135 port 36740
Jul 26 20:47:07 MK-Soft-VM4 sshd\[3027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.135
Jul 26 20:47:09 MK-Soft-VM4 sshd\[3027\]: Failed password for invalid user ariel from 192.99.245.135 port 36740 ssh2
...
2019-07-27 04:49:27
103.103.181.18 attackbots
Jul 26 22:18:53 OPSO sshd\[2197\]: Invalid user aq1sw2de3 from 103.103.181.18 port 39624
Jul 26 22:18:53 OPSO sshd\[2197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.103.181.18
Jul 26 22:18:55 OPSO sshd\[2197\]: Failed password for invalid user aq1sw2de3 from 103.103.181.18 port 39624 ssh2
Jul 26 22:24:12 OPSO sshd\[2955\]: Invalid user zzz258 from 103.103.181.18 port 37090
Jul 26 22:24:12 OPSO sshd\[2955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.103.181.18
2019-07-27 04:34:49
159.65.144.233 attackbotsspam
SSH Brute Force, server-1 sshd[25106]: Failed password for invalid user scaner from 159.65.144.233 port 53468 ssh2
2019-07-27 04:57:42

Recently Reported IPs

121.207.104.14 121.207.104.145 121.207.104.149 121.207.104.150
121.207.104.153 121.207.104.157 121.207.104.159 121.207.104.16
121.207.104.163 121.207.104.167 121.207.104.168 121.207.104.171
121.207.104.172 121.207.104.176 146.172.208.220 121.224.130.208
121.224.130.224 121.224.130.246 121.224.130.29 121.224.130.6