Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.26.229.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.26.229.242.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:47:09 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 242.229.26.121.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 242.229.26.121.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
138.197.102.225 attackbots
Wordpress attack
2019-07-20 18:57:19
145.239.128.24 attack
145.239.128.24 - - \[20/Jul/2019:10:37:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.128.24 - - \[20/Jul/2019:10:37:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-20 18:18:14
113.160.148.74 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-07-20 18:55:34
31.163.149.197 attackspam
Honeypot attack, port: 23, PTR: ws197.zone31-163-149.zaural.ru.
2019-07-20 18:51:29
138.68.72.10 attack
firewall-block, port(s): 2551/tcp
2019-07-20 18:31:18
68.161.231.230 attackbotsspam
Honeypot attack, port: 23, PTR: static-68-161-231-230.ny325.east.verizon.net.
2019-07-20 19:00:42
115.84.112.98 attack
Automatic report - Banned IP Access
2019-07-20 18:50:41
200.69.204.143 attackbotsspam
2019-07-20T10:45:07.342420abusebot-4.cloudsearch.cf sshd\[18665\]: Invalid user ebook from 200.69.204.143 port 3105
2019-07-20 19:02:58
81.136.164.32 attack
Honeypot attack, port: 23, PTR: host81-136-164-32.in-addr.btopenworld.com.
2019-07-20 18:57:57
49.88.112.54 attack
Jul 16 06:58:42 hgb10502 sshd[4116]: User r.r from 49.88.112.54 not allowed because not listed in AllowUsers
Jul 16 06:58:44 hgb10502 sshd[4116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.54  user=r.r
Jul 16 06:58:46 hgb10502 sshd[4116]: Failed password for invalid user r.r from 49.88.112.54 port 9788 ssh2
Jul 16 06:58:51 hgb10502 sshd[4116]: Failed password for invalid user r.r from 49.88.112.54 port 9788 ssh2
Jul 16 06:59:13 hgb10502 sshd[4116]: Failed password for invalid user r.r from 49.88.112.54 port 9788 ssh2
Jul 16 06:59:13 hgb10502 sshd[4116]: Received disconnect from 49.88.112.54 port 9788:11:  [preauth]
Jul 16 06:59:13 hgb10502 sshd[4116]: Disconnected from 49.88.112.54 port 9788 [preauth]
Jul 16 06:59:13 hgb10502 sshd[4116]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.54  user=r.r
Jul 16 06:59:14 hgb10502 sshd[4166]: Received disconnect from 49.88.112.54 port........
-------------------------------
2019-07-20 18:48:00
123.195.106.186 attack
Honeypot attack, port: 23, PTR: 123-195-106-186.dynamic.kbronet.com.tw.
2019-07-20 19:06:57
60.191.49.238 attack
SMB Server BruteForce Attack
2019-07-20 18:47:27
2a0a:7d80:1:7::100 attackspambots
Attack to wordpress xmlrpc
2019-07-20 19:09:45
186.216.153.227 attackbotsspam
failed_logins
2019-07-20 19:11:48
220.135.135.165 attack
Jul 20 11:48:56 minden010 sshd[11769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.135.165
Jul 20 11:48:58 minden010 sshd[11769]: Failed password for invalid user ts3srv from 220.135.135.165 port 53964 ssh2
Jul 20 11:56:25 minden010 sshd[14428]: Failed password for root from 220.135.135.165 port 51542 ssh2
...
2019-07-20 18:27:10

Recently Reported IPs

121.26.145.22 121.28.98.226 121.29.178.146 121.29.111.196
121.29.178.104 121.29.178.162 121.29.178.189 121.29.178.190
121.29.178.193 121.29.178.219 121.29.178.229 121.29.178.27
121.29.178.29 121.29.178.42 121.29.178.53 121.29.178.79
121.29.178.9 121.29.188.114 121.29.188.162 121.29.188.153