Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.40.72.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.40.72.69.			IN	A

;; AUTHORITY SECTION:
.			4	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:47:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 69.72.40.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.72.40.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.68.66 attackspambots
Jul  3 21:59:50 ns381471 sshd[26166]: Failed password for postgres from 54.37.68.66 port 50160 ssh2
Jul  3 22:03:31 ns381471 sshd[26330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.68.66
2020-07-04 04:10:21
119.29.173.247 attackbotsspam
Jul  3 21:28:42 cp sshd[20955]: Failed password for root from 119.29.173.247 port 37672 ssh2
Jul  3 21:28:42 cp sshd[20955]: Failed password for root from 119.29.173.247 port 37672 ssh2
2020-07-04 03:57:00
195.54.160.183 attackbots
Fail2Ban Ban Triggered
2020-07-04 04:17:08
195.243.132.248 attack
Jul  3 22:03:59 sso sshd[21951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.243.132.248
Jul  3 22:04:01 sso sshd[21951]: Failed password for invalid user edwin from 195.243.132.248 port 36126 ssh2
...
2020-07-04 04:04:30
222.186.175.182 attackbots
Jul  3 22:03:31 vm0 sshd[27479]: Failed password for root from 222.186.175.182 port 32906 ssh2
Jul  3 22:03:34 vm0 sshd[27479]: Failed password for root from 222.186.175.182 port 32906 ssh2
...
2020-07-04 04:03:58
61.177.172.177 attack
2020-07-03T20:03:17.641175abusebot-7.cloudsearch.cf sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-07-03T20:03:19.604113abusebot-7.cloudsearch.cf sshd[23132]: Failed password for root from 61.177.172.177 port 55684 ssh2
2020-07-03T20:03:21.874633abusebot-7.cloudsearch.cf sshd[23132]: Failed password for root from 61.177.172.177 port 55684 ssh2
2020-07-03T20:03:17.641175abusebot-7.cloudsearch.cf sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
2020-07-03T20:03:19.604113abusebot-7.cloudsearch.cf sshd[23132]: Failed password for root from 61.177.172.177 port 55684 ssh2
2020-07-03T20:03:21.874633abusebot-7.cloudsearch.cf sshd[23132]: Failed password for root from 61.177.172.177 port 55684 ssh2
2020-07-03T20:03:17.641175abusebot-7.cloudsearch.cf sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2020-07-04 04:14:37
68.183.230.47 attackbotsspam
$f2bV_matches
2020-07-04 04:09:21
223.240.121.68 attackbots
Jul  3 20:21:44 rotator sshd\[9577\]: Invalid user ubuntu from 223.240.121.68Jul  3 20:21:46 rotator sshd\[9577\]: Failed password for invalid user ubuntu from 223.240.121.68 port 51646 ssh2Jul  3 20:26:26 rotator sshd\[10347\]: Invalid user cic from 223.240.121.68Jul  3 20:26:29 rotator sshd\[10347\]: Failed password for invalid user cic from 223.240.121.68 port 44062 ssh2Jul  3 20:30:54 rotator sshd\[11126\]: Invalid user jessica from 223.240.121.68Jul  3 20:30:56 rotator sshd\[11126\]: Failed password for invalid user jessica from 223.240.121.68 port 36484 ssh2
...
2020-07-04 03:46:28
61.177.172.159 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-04 04:11:42
103.99.150.234 attack
Unauthorized connection attempt from IP address 103.99.150.234 on Port 445(SMB)
2020-07-04 03:41:16
107.6.169.250 attackspam
Port scan: Attack repeated for 24 hours
2020-07-04 04:05:10
112.85.42.173 attackspam
Jul  3 22:12:07 ns381471 sshd[26937]: Failed password for root from 112.85.42.173 port 33733 ssh2
Jul  3 22:12:21 ns381471 sshd[26937]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 33733 ssh2 [preauth]
2020-07-04 04:14:08
89.248.168.244 attack
 TCP (SYN) 89.248.168.244:48085 -> port 56008, len 44
2020-07-04 03:44:49
106.13.187.27 attackbotsspam
20 attempts against mh-ssh on mist
2020-07-04 04:21:08
138.68.176.38 attackbots
$f2bV_matches
2020-07-04 04:06:34

Recently Reported IPs

121.40.61.238 121.40.74.170 121.40.77.64 121.40.96.10
121.41.100.254 121.41.102.222 121.40.98.99 121.41.114.28
121.41.104.77 121.41.114.115 121.41.130.32 121.41.142.252
121.41.176.7 121.41.17.254 121.41.177.228 121.41.224.230
121.41.224.79 121.41.227.53 121.41.23.39 121.41.24.204