Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.21.0.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.21.0.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 20:24:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 142.0.21.121.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 121.21.0.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
104.103.101.75 attackbotsspam
firewall-block, port(s): 49438/tcp, 49439/tcp, 49444/tcp, 49460/tcp, 49461/tcp, 53253/tcp, 54638/tcp, 54650/tcp, 54665/tcp, 55699/tcp, 55923/tcp, 55943/tcp, 55944/tcp, 55945/tcp, 56018/tcp, 56019/tcp, 56024/tcp, 56038/tcp, 56039/tcp, 56040/tcp, 56041/tcp, 56042/tcp, 56675/tcp, 56711/tcp, 56777/tcp, 57013/tcp, 57436/tcp, 58352/tcp, 58360/tcp, 58363/tcp, 58724/tcp, 59827/tcp, 64970/tcp
2019-12-23 23:04:43
51.15.192.14 attack
Dec 23 21:57:37 itv-usvr-01 sshd[18865]: Invalid user quiroz from 51.15.192.14
Dec 23 21:57:37 itv-usvr-01 sshd[18865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.192.14
Dec 23 21:57:37 itv-usvr-01 sshd[18865]: Invalid user quiroz from 51.15.192.14
Dec 23 21:57:39 itv-usvr-01 sshd[18865]: Failed password for invalid user quiroz from 51.15.192.14 port 59990 ssh2
Dec 23 22:02:16 itv-usvr-01 sshd[19065]: Invalid user danni from 51.15.192.14
2019-12-23 23:02:30
92.222.34.211 attack
Dec 23 04:54:04 hpm sshd\[28207\]: Invalid user chretien from 92.222.34.211
Dec 23 04:54:04 hpm sshd\[28207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.ip-92-222-34.eu
Dec 23 04:54:07 hpm sshd\[28207\]: Failed password for invalid user chretien from 92.222.34.211 port 53258 ssh2
Dec 23 04:59:58 hpm sshd\[28728\]: Invalid user lisabeth from 92.222.34.211
Dec 23 04:59:58 hpm sshd\[28728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.ip-92-222-34.eu
2019-12-23 23:09:25
167.71.6.221 attackbots
Dec 23 14:43:04 ns41 sshd[16997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.6.221
2019-12-23 22:58:51
13.209.126.55 attackbots
Feb 13 14:30:35 dillonfme sshd\[13157\]: Invalid user deploy from 13.209.126.55 port 33828
Feb 13 14:30:35 dillonfme sshd\[13157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.126.55
Feb 13 14:30:38 dillonfme sshd\[13157\]: Failed password for invalid user deploy from 13.209.126.55 port 33828 ssh2
Feb 13 14:36:30 dillonfme sshd\[13368\]: Invalid user cashier from 13.209.126.55 port 53208
Feb 13 14:36:30 dillonfme sshd\[13368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.126.55
...
2019-12-23 23:28:45
13.209.231.47 attackbots
Feb 12 14:00:39 dillonfme sshd\[21070\]: Invalid user nithya from 13.209.231.47 port 38598
Feb 12 14:00:40 dillonfme sshd\[21070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.231.47
Feb 12 14:00:42 dillonfme sshd\[21070\]: Failed password for invalid user nithya from 13.209.231.47 port 38598 ssh2
Feb 12 14:06:37 dillonfme sshd\[21408\]: Invalid user michael from 13.209.231.47 port 58384
Feb 12 14:06:37 dillonfme sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.209.231.47
...
2019-12-23 23:28:05
13.230.69.148 attackspambots
Mar 10 03:49:06 dillonfme sshd\[32458\]: Invalid user Lunixx from 13.230.69.148 port 59314
Mar 10 03:49:06 dillonfme sshd\[32458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.230.69.148
Mar 10 03:49:09 dillonfme sshd\[32458\]: Failed password for invalid user Lunixx from 13.230.69.148 port 59314 ssh2
Mar 10 03:56:59 dillonfme sshd\[32643\]: User root from 13.230.69.148 not allowed because not listed in AllowUsers
Mar 10 03:56:59 dillonfme sshd\[32643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.230.69.148  user=root
...
2019-12-23 23:25:49
5.196.7.123 attackbotsspam
2019-12-23T15:09:51.526735shield sshd\[24448\]: Invalid user ching from 5.196.7.123 port 52646
2019-12-23T15:09:51.531268shield sshd\[24448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.ip-5-196-7.eu
2019-12-23T15:09:53.388187shield sshd\[24448\]: Failed password for invalid user ching from 5.196.7.123 port 52646 ssh2
2019-12-23T15:15:04.032196shield sshd\[25638\]: Invalid user willmott from 5.196.7.123 port 56104
2019-12-23T15:15:04.037103shield sshd\[25638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.ip-5-196-7.eu
2019-12-23 23:30:09
124.163.244.245 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-23 23:26:29
49.235.140.231 attackbots
Dec 23 15:59:52 localhost sshd\[11140\]: Invalid user jonelle from 49.235.140.231 port 36544
Dec 23 15:59:52 localhost sshd\[11140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.140.231
Dec 23 15:59:54 localhost sshd\[11140\]: Failed password for invalid user jonelle from 49.235.140.231 port 36544 ssh2
2019-12-23 23:16:03
45.80.64.246 attackspambots
Dec 23 09:50:19 ny01 sshd[18509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246
Dec 23 09:50:21 ny01 sshd[18509]: Failed password for invalid user luehring from 45.80.64.246 port 33384 ssh2
Dec 23 10:00:19 ny01 sshd[20055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246
2019-12-23 23:02:55
139.198.191.86 attackspambots
Dec 23 16:13:03 legacy sshd[24061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.86
Dec 23 16:13:05 legacy sshd[24061]: Failed password for invalid user ouc from 139.198.191.86 port 41468 ssh2
Dec 23 16:19:20 legacy sshd[24264]: Failed password for root from 139.198.191.86 port 34110 ssh2
...
2019-12-23 23:20:20
178.128.119.193 attackspambots
Dec 23 15:53:38 root sshd[22669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.119.193 
Dec 23 15:53:40 root sshd[22669]: Failed password for invalid user dawn from 178.128.119.193 port 59264 ssh2
Dec 23 15:59:57 root sshd[22756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.119.193 
...
2019-12-23 23:14:01
13.66.192.66 attackspambots
Apr 14 14:43:24 yesfletchmain sshd\[12868\]: Invalid user ebeuser from 13.66.192.66 port 34966
Apr 14 14:43:24 yesfletchmain sshd\[12868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
Apr 14 14:43:26 yesfletchmain sshd\[12868\]: Failed password for invalid user ebeuser from 13.66.192.66 port 34966 ssh2
Apr 14 14:46:40 yesfletchmain sshd\[12907\]: Invalid user win from 13.66.192.66 port 35030
Apr 14 14:46:40 yesfletchmain sshd\[12907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.66.192.66
...
2019-12-23 23:07:02
182.23.104.231 attackspambots
Dec 23 05:36:32 server sshd\[782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.104.231 
Dec 23 05:36:34 server sshd\[782\]: Failed password for invalid user zeus from 182.23.104.231 port 38282 ssh2
Dec 23 13:27:05 server sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.104.231  user=ftp
Dec 23 13:27:06 server sshd\[965\]: Failed password for ftp from 182.23.104.231 port 47050 ssh2
Dec 23 17:59:47 server sshd\[7826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.104.231  user=root
...
2019-12-23 23:28:23

Recently Reported IPs

15.216.157.130 196.233.136.93 118.201.181.121 222.188.49.170
234.4.218.166 19.222.146.44 141.94.4.37 196.168.19.154
195.69.47.60 180.3.91.71 139.149.33.125 251.92.47.28
89.181.33.171 236.101.195.228 147.44.250.207 32.185.1.138
189.217.9.77 88.3.156.222 31.36.147.245 145.127.249.95