Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.249.197.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.249.197.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 08:22:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 56.197.249.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.197.249.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.75.254.114 attackspambots
Brute-force attempt banned
2020-04-14 05:37:17
202.71.28.10 attackspam
Unauthorized connection attempt from IP address 202.71.28.10 on Port 445(SMB)
2020-04-14 05:20:01
104.227.245.92 attack
[portscan] Port scan
2020-04-14 05:38:11
171.7.54.234 attack
Unauthorized connection attempt from IP address 171.7.54.234 on Port 445(SMB)
2020-04-14 05:30:50
132.232.52.86 attackspambots
$f2bV_matches
2020-04-14 05:36:46
43.226.67.8 attackbots
" "
2020-04-14 05:32:03
118.70.169.8 attack
Unauthorized connection attempt from IP address 118.70.169.8 on Port 445(SMB)
2020-04-14 05:36:59
178.62.33.222 attackbots
178.62.33.222 - - [13/Apr/2020:20:24:19 +0200] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.62.33.222 - - [13/Apr/2020:20:24:30 +0200] "POST /wp-login.php HTTP/1.0" 200 2173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-14 05:07:41
138.94.134.17 attackbots
Unauthorized connection attempt from IP address 138.94.134.17 on Port 445(SMB)
2020-04-14 05:19:15
213.74.115.50 attack
Unauthorized connection attempt from IP address 213.74.115.50 on Port 445(SMB)
2020-04-14 05:29:13
181.179.2.14 attack
Unauthorized connection attempt from IP address 181.179.2.14 on Port 445(SMB)
2020-04-14 05:33:35
83.47.233.55 attackspam
Apr 13 21:02:50 game-panel sshd[2641]: Failed password for root from 83.47.233.55 port 56252 ssh2
Apr 13 21:06:45 game-panel sshd[2823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.47.233.55
Apr 13 21:06:47 game-panel sshd[2823]: Failed password for invalid user test from 83.47.233.55 port 36920 ssh2
2020-04-14 05:15:27
106.51.86.204 attackspambots
Apr 13 17:07:43 game-panel sshd[23458]: Failed password for root from 106.51.86.204 port 58104 ssh2
Apr 13 17:11:56 game-panel sshd[23715]: Failed password for root from 106.51.86.204 port 37388 ssh2
2020-04-14 05:09:51
86.101.206.156 attackspam
T: f2b ssh aggressive 3x
2020-04-14 05:20:39
183.129.141.44 attackspambots
SSH Login Bruteforce
2020-04-14 05:14:55

Recently Reported IPs

88.19.175.192 149.254.33.212 175.156.48.143 115.149.244.137
56.122.234.13 229.74.141.206 55.23.145.196 8.150.101.142
143.134.153.107 91.32.223.184 144.13.213.60 41.2.104.147
37.111.223.127 203.149.214.8 52.107.114.194 43.230.65.9
190.44.115.72 17.154.206.86 199.182.79.201 253.149.182.158