Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.208.195.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.208.195.164.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:54:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
164.195.208.121.in-addr.arpa domain name pointer cpe-121-208-195-164.vb08.vic.asp.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.195.208.121.in-addr.arpa	name = cpe-121-208-195-164.vb08.vic.asp.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.23.127.95 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 20:31:07
142.217.140.186 attackspambots
Lines containing failures of 142.217.140.186
Jul 28 13:49:28 shared04 sshd[32545]: Invalid user pi from 142.217.140.186 port 35400
Jul 28 13:49:28 shared04 sshd[32545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.217.140.186
Jul 28 13:49:28 shared04 sshd[32547]: Invalid user pi from 142.217.140.186 port 35410
Jul 28 13:49:28 shared04 sshd[32547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.217.140.186
Jul 28 13:49:31 shared04 sshd[32545]: Failed password for invalid user pi from 142.217.140.186 port 35400 ssh2
Jul 28 13:49:31 shared04 sshd[32545]: Connection closed by invalid user pi 142.217.140.186 port 35400 [preauth]
Jul 28 13:49:31 shared04 sshd[32547]: Failed password for invalid user pi from 142.217.140.186 port 35410 ssh2
Jul 28 13:49:31 shared04 sshd[32547]: Connection closed by invalid user pi 142.217.140.186 port 35410 [preauth]


........
-----------------------------------------------
https://www.blockl
2020-08-01 20:01:01
89.248.167.131 attackspam
Unauthorized connection attempt detected from IP address 89.248.167.131 to port 5938
2020-08-01 20:20:42
89.248.160.178 attackbotsspam
Port Scan
...
2020-08-01 20:29:40
51.158.98.224 attack
2020-07-29 08:02:45,285 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 51.158.98.224
2020-07-29 08:20:39,409 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 51.158.98.224
2020-07-29 08:38:00,194 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 51.158.98.224
2020-07-29 08:55:22,486 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 51.158.98.224
2020-07-29 09:13:22,182 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 51.158.98.224
...
2020-08-01 19:56:00
184.154.189.90 attack
Unauthorized connection attempt detected from IP address 184.154.189.90 to port 1883
2020-08-01 20:21:57
141.98.9.161 attackspambots
Invalid user admin from 141.98.9.161 port 42171
2020-08-01 20:07:32
109.105.17.243 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-01 20:28:04
42.116.227.79 attackbots
Email rejected due to spam filtering
2020-08-01 20:31:39
45.55.233.213 attack
frenzy
2020-08-01 20:17:11
46.8.178.118 attack
Unauthorized connection attempt detected from IP address 46.8.178.118 to port 1433
2020-08-01 19:53:15
145.239.252.226 attackbotsspam
Aug  1 13:46:05 ns382633 sshd\[22244\]: Invalid user admin from 145.239.252.226 port 51110
Aug  1 13:46:05 ns382633 sshd\[22244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.252.226
Aug  1 13:46:07 ns382633 sshd\[22244\]: Failed password for invalid user admin from 145.239.252.226 port 51110 ssh2
Aug  1 13:46:08 ns382633 sshd\[22247\]: Invalid user admin from 145.239.252.226 port 52126
Aug  1 13:46:08 ns382633 sshd\[22247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.252.226
2020-08-01 19:52:00
213.97.127.122 attackspambots
Unauthorized connection attempt from IP address 213.97.127.122 on Port 445(SMB)
2020-08-01 20:15:48
96.78.177.242 attackbotsspam
Invalid user sonaruser from 96.78.177.242 port 49046
2020-08-01 20:17:42
102.171.134.104 attackspam
Email rejected due to spam filtering
2020-08-01 20:29:21

Recently Reported IPs

39.116.42.128 4.159.121.118 63.92.197.116 188.50.108.141
251.68.132.154 69.100.61.205 26.125.247.203 165.60.3.135
214.4.73.31 90.193.201.122 193.112.248.186 189.194.127.27
83.207.71.125 69.210.229.213 2.133.52.179 214.95.154.103
99.168.109.142 74.181.240.201 101.111.191.161 252.54.55.237