Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
121.234.219.249 attack
Aug 26 04:38:42 shivevps sshd[21284]: Bad protocol version identification '\024' from 121.234.219.249 port 50172
Aug 26 04:38:49 shivevps sshd[21427]: Bad protocol version identification '\024' from 121.234.219.249 port 50342
Aug 26 04:39:21 shivevps sshd[21974]: Bad protocol version identification '\024' from 121.234.219.249 port 50648
Aug 26 04:39:58 shivevps sshd[23441]: Bad protocol version identification '\024' from 121.234.219.249 port 51424
...
2020-08-26 16:24:52
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '121.224.0.0 - 121.239.255.255'

% Abuse contact for '121.224.0.0 - 121.239.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        121.224.0.0 - 121.239.255.255
netname:        CHINANET-JS
descr:          CHINANET jiangsu province network
descr:          China Telecom
descr:          A12,Xin-Jie-Kou-Wai Street
descr:          Beijing 100088
country:        CN
admin-c:        CH93-AP
tech-c:         CJ186-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-JS
mnt-routes:     MAINT-CHINANET-JS
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:05:09Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
mnt-by:         MAINT-CHINANET
last-modified:  2026-03-13T07:12:20Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-11-13
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-13T14:15:15Z
source:         APNIC

role:           CHINANET JIANGSU
address:        260 Zhongyang Road,Nanjing 210037
country:        CN
phone:          +86-25-87799222
e-mail:         jsipmanager@163.com
remarks:        send anti-spam reports tojsipmanager@163.com
remarks:        send abuse reports tojsipmanager@163.com
remarks:        times in GMT+8
remarks:        www.jsinfo.net
admin-c:        CH360-AP
tech-c:         CS306-AP
tech-c:         CN142-AP
nic-hdl:        CJ186-AP
notify:         jsipmanager@163.com
mnt-by:         MAINT-CHINANET-JS
last-modified:  2022-08-05T15:34:47Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.234.219.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.234.219.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 17:16:22 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 138.219.234.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.219.234.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.106.212.19 attackspam
xmlrpc attack
2019-08-09 23:09:43
181.214.48.92 attackbotsspam
Registration form abuse
2019-08-09 22:17:56
218.92.0.200 attackspam
Aug  9 14:23:06 MK-Soft-VM3 sshd\[14296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
Aug  9 14:23:08 MK-Soft-VM3 sshd\[14296\]: Failed password for root from 218.92.0.200 port 41821 ssh2
Aug  9 14:23:10 MK-Soft-VM3 sshd\[14296\]: Failed password for root from 218.92.0.200 port 41821 ssh2
...
2019-08-09 22:39:36
219.91.66.9 attackspambots
Aug  9 15:48:34 microserver sshd[23859]: Invalid user student from 219.91.66.9 port 52986
Aug  9 15:48:34 microserver sshd[23859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.66.9
Aug  9 15:48:36 microserver sshd[23859]: Failed password for invalid user student from 219.91.66.9 port 52986 ssh2
Aug  9 15:53:51 microserver sshd[24577]: Invalid user range from 219.91.66.9 port 47616
Aug  9 15:53:51 microserver sshd[24577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.66.9
Aug  9 16:04:13 microserver sshd[26011]: Invalid user user3 from 219.91.66.9 port 36658
Aug  9 16:04:13 microserver sshd[26011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.91.66.9
Aug  9 16:04:15 microserver sshd[26011]: Failed password for invalid user user3 from 219.91.66.9 port 36658 ssh2
Aug  9 16:09:28 microserver sshd[26755]: Invalid user sherry from 219.91.66.9 port 59412
Aug  9 16:09:28 mi
2019-08-09 22:20:52
111.231.58.207 attackbotsspam
Aug  9 13:41:54 MK-Soft-VM5 sshd\[14126\]: Invalid user felix from 111.231.58.207 port 37432
Aug  9 13:41:54 MK-Soft-VM5 sshd\[14126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.58.207
Aug  9 13:41:57 MK-Soft-VM5 sshd\[14126\]: Failed password for invalid user felix from 111.231.58.207 port 37432 ssh2
...
2019-08-09 22:22:42
209.212.145.13 attack
xmlrpc attack
2019-08-09 23:15:14
142.44.160.173 attackbots
Aug  9 15:35:00 ubuntu-2gb-nbg1-dc3-1 sshd[32579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
Aug  9 15:35:03 ubuntu-2gb-nbg1-dc3-1 sshd[32579]: Failed password for invalid user deb from 142.44.160.173 port 60140 ssh2
...
2019-08-09 22:25:23
209.99.169.169 attack
Registration form abuse
2019-08-09 23:20:40
51.75.208.180 attackbotsspam
xmlrpc attack
2019-08-09 22:40:40
113.255.251.116 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-09 22:43:06
81.145.158.178 attackspam
SSH invalid-user multiple login attempts
2019-08-09 22:56:09
103.112.189.137 attackspam
MailAuth Probe, BF, Hack -
2019-08-09 23:06:37
43.227.67.199 attack
Aug  9 08:55:02 ubuntu-2gb-nbg1-dc3-1 sshd[4694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.67.199
Aug  9 08:55:05 ubuntu-2gb-nbg1-dc3-1 sshd[4694]: Failed password for invalid user backlog from 43.227.67.199 port 58206 ssh2
...
2019-08-09 22:54:32
51.77.146.153 attack
Failed password for invalid user benites from 51.77.146.153 port 45092 ssh2
Invalid user justin from 51.77.146.153 port 38718
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.153
Failed password for invalid user justin from 51.77.146.153 port 38718 ssh2
Invalid user toor from 51.77.146.153 port 60128
2019-08-09 23:19:18
5.54.198.149 attack
Telnet Server BruteForce Attack
2019-08-09 23:16:22

Recently Reported IPs

2606:4700:10::6816:998 2606:4700:10::6816:2140 164.155.74.48 2606:4700:10::ac43:823
109.162.246.59 2606:4700:10::6816:3935 195.178.110.204 47.237.74.84
123.13.85.235 2606:4700:10::6814:5085 2606:4700:10::6814:9667 110.78.156.153
2606:4700:10::6814:5001 2606:4700:10::6814:4454 2606:4700:10::6814:8694 2606:4700:10::6814:9958
2606:4700:10::6816:4060 2606:4700:10::6814:6849 121.234.219.116 64.23.170.38