Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.37.149.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.37.149.3.			IN	A

;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 12:47:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
3.149.37.121.in-addr.arpa domain name pointer ecs-121-37-149-3.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.149.37.121.in-addr.arpa	name = ecs-121-37-149-3.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.99.148.4 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 04:17:51
71.6.158.166 attackbots
Unauthorized connection attempt detected from IP address 71.6.158.166 to port 902
2020-07-11 04:20:03
61.178.103.145 attackspam
firewall-block, port(s): 1433/tcp
2020-07-11 04:35:55
175.98.155.94 attack
Unauthorized connection attempt from IP address 175.98.155.94 on Port 445(SMB)
2020-07-11 04:39:32
5.189.141.116 attack
Unauthorized SSH login attempts
2020-07-11 04:49:03
51.68.152.140 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-11 04:45:57
165.227.193.200 attackbots
firewall-block, port(s): 29541/tcp
2020-07-11 04:26:28
209.17.96.18 attack
8888/tcp 8000/tcp 8081/tcp...
[2020-05-11/07-10]59pkt,13pt.(tcp),1pt.(udp)
2020-07-11 04:49:34
62.14.242.34 attackspambots
Jul 10 20:21:55 Ubuntu-1404-trusty-64-minimal sshd\[4270\]: Invalid user haisheng from 62.14.242.34
Jul 10 20:21:55 Ubuntu-1404-trusty-64-minimal sshd\[4270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.14.242.34
Jul 10 20:21:57 Ubuntu-1404-trusty-64-minimal sshd\[4270\]: Failed password for invalid user haisheng from 62.14.242.34 port 41991 ssh2
Jul 10 20:36:11 Ubuntu-1404-trusty-64-minimal sshd\[15492\]: Invalid user zbx from 62.14.242.34
Jul 10 20:36:11 Ubuntu-1404-trusty-64-minimal sshd\[15492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.14.242.34
2020-07-11 04:18:48
93.92.135.164 attack
Jul 10 20:44:07 Ubuntu-1404-trusty-64-minimal sshd\[19967\]: Invalid user ritchie from 93.92.135.164
Jul 10 20:44:07 Ubuntu-1404-trusty-64-minimal sshd\[19967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.92.135.164
Jul 10 20:44:09 Ubuntu-1404-trusty-64-minimal sshd\[19967\]: Failed password for invalid user ritchie from 93.92.135.164 port 59212 ssh2
Jul 10 20:50:41 Ubuntu-1404-trusty-64-minimal sshd\[23392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.92.135.164  user=mail
Jul 10 20:50:43 Ubuntu-1404-trusty-64-minimal sshd\[23392\]: Failed password for mail from 93.92.135.164 port 36818 ssh2
2020-07-11 04:45:35
217.76.194.222 attackspam
firewall-block, port(s): 445/tcp
2020-07-11 04:13:55
106.13.211.27 attackspambots
 TCP (SYN) 106.13.211.27:58888 -> port 445, len 52
2020-07-11 04:38:00
123.20.186.36 attackbots
445/tcp
[2020-07-10]1pkt
2020-07-11 04:24:23
187.20.244.83 attackspam
Lines containing failures of 187.20.244.83
Jul  8 05:07:35 nemesis sshd[12152]: Invalid user frieda from 187.20.244.83 port 56321
Jul  8 05:07:35 nemesis sshd[12152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.20.244.83 
Jul  8 05:07:37 nemesis sshd[12152]: Failed password for invalid user frieda from 187.20.244.83 port 56321 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.20.244.83
2020-07-11 04:46:54
54.36.67.205 attackspam
23/tcp
[2020-07-10]1pkt
2020-07-11 04:32:32

Recently Reported IPs

47.106.177.157 186.73.175.161 89.229.209.109 165.22.45.9
99.235.165.165 189.229.26.42 78.146.79.7 211.233.49.186
142.59.52.12 84.228.10.149 66.242.217.193 137.184.59.80
71.25.118.117 176.212.98.239 74.69.255.235 47.116.139.172
122.117.113.59 169.229.52.222 137.226.244.27 80.66.65.69