Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.4.245.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.4.245.53.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 22:29:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.245.4.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.245.4.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.146.101.129 attackspambots
Feb 19 14:37:10 dillonfme sshd\[18041\]: Invalid user test7 from 129.146.101.129 port 45989
Feb 19 14:37:10 dillonfme sshd\[18041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.101.129
Feb 19 14:37:12 dillonfme sshd\[18041\]: Failed password for invalid user test7 from 129.146.101.129 port 45989 ssh2
Feb 19 14:42:52 dillonfme sshd\[18312\]: Invalid user elasticsearch from 129.146.101.129 port 23642
Feb 19 14:42:52 dillonfme sshd\[18312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.101.129
...
2019-12-24 06:15:07
106.12.23.128 attack
Dec 23 16:58:01 vps691689 sshd[30193]: Failed password for root from 106.12.23.128 port 36202 ssh2
Dec 23 17:03:37 vps691689 sshd[30340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.23.128
...
2019-12-24 06:39:03
46.38.144.202 attackspam
2019-09-19 02:32:03 -> 2019-12-23 15:47:11 : 13013 login attempts (46.38.144.202)
2019-12-24 06:44:59
123.132.77.2 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 06:34:21
198.108.67.36 attackbots
firewall-block, port(s): 50000/tcp
2019-12-24 06:26:59
184.105.247.246 attackbotsspam
Port 3389 Scan
2019-12-24 06:14:36
191.136.229.148 attackspambots
Unauthorized connection attempt detected from IP address 191.136.229.148 to port 445
2019-12-24 06:20:32
129.144.3.228 attackspambots
Feb 15 11:32:49 dillonfme sshd\[21819\]: Invalid user server from 129.144.3.228 port 34371
Feb 15 11:32:49 dillonfme sshd\[21819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.3.228
Feb 15 11:32:50 dillonfme sshd\[21819\]: Failed password for invalid user server from 129.144.3.228 port 34371 ssh2
Feb 15 11:41:12 dillonfme sshd\[22167\]: Invalid user service from 129.144.3.228 port 58254
Feb 15 11:41:12 dillonfme sshd\[22167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.3.228
...
2019-12-24 06:28:32
139.162.123.29 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 06:33:36
77.247.108.77 attack
Dec 23 22:58:51 debian-2gb-nbg1-2 kernel: \[791075.312369\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.77 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=41133 PROTO=TCP SPT=56263 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-24 06:08:29
54.39.98.253 attack
Dec 23 16:57:38 MK-Soft-VM5 sshd[26488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.98.253 
Dec 23 16:57:40 MK-Soft-VM5 sshd[26488]: Failed password for invalid user zeiger from 54.39.98.253 port 48678 ssh2
...
2019-12-24 06:41:33
128.14.181.66 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-12-24 06:13:29
148.240.238.91 attackspam
Dec 23 22:36:53 nextcloud sshd\[26537\]: Invalid user lisa from 148.240.238.91
Dec 23 22:36:53 nextcloud sshd\[26537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.240.238.91
Dec 23 22:36:54 nextcloud sshd\[26537\]: Failed password for invalid user lisa from 148.240.238.91 port 56796 ssh2
...
2019-12-24 06:13:04
128.91.208.83 attackspam
Apr 13 23:56:56 yesfletchmain sshd\[14692\]: Invalid user nagios from 128.91.208.83 port 54924
Apr 13 23:56:56 yesfletchmain sshd\[14692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.91.208.83
Apr 13 23:56:58 yesfletchmain sshd\[14692\]: Failed password for invalid user nagios from 128.91.208.83 port 54924 ssh2
Apr 13 23:59:19 yesfletchmain sshd\[14745\]: Invalid user vpnguardbot from 128.91.208.83 port 54572
Apr 13 23:59:19 yesfletchmain sshd\[14745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.91.208.83
...
2019-12-24 06:44:25
122.5.46.22 attackbotsspam
Dec 23 06:31:08 sachi sshd\[6291\]: Invalid user franciszek from 122.5.46.22
Dec 23 06:31:08 sachi sshd\[6291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.5.46.22
Dec 23 06:31:10 sachi sshd\[6291\]: Failed password for invalid user franciszek from 122.5.46.22 port 52050 ssh2
Dec 23 06:39:33 sachi sshd\[6990\]: Invalid user canute from 122.5.46.22
Dec 23 06:39:33 sachi sshd\[6990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.5.46.22
2019-12-24 06:21:10

Recently Reported IPs

178.72.75.120 35.88.246.35 137.184.122.113 211.143.100.233
98.143.104.197 115.124.115.26 106.12.5.134 211.214.152.142
120.239.128.2 181.46.18.119 5.40.253.250 192.162.194.132
159.89.165.164 14.233.143.183 151.235.202.133 176.30.215.75
73.67.182.43 43.133.181.32 59.126.124.251 170.106.115.39