Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hangzhou

Region: Zhejiang

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.41.171.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.41.171.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 27 13:00:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 138.171.41.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.171.41.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.64.94.77 attackbots
Honeypot attack, port: 81, PTR: 85.64.94.77.dynamic.barak-online.net.
2020-09-07 21:10:51
222.186.15.62 attack
SSH bruteforce
2020-09-07 21:37:35
37.139.20.6 attackspambots
Sep  7 13:56:14 eventyay sshd[23690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.20.6
Sep  7 13:56:16 eventyay sshd[23690]: Failed password for invalid user photography from 37.139.20.6 port 42637 ssh2
Sep  7 14:05:07 eventyay sshd[23898]: Failed password for root from 37.139.20.6 port 45920 ssh2
...
2020-09-07 21:16:25
103.69.68.6 attack
Sep  6 18:20:59 cumulus sshd[19143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.69.68.6  user=r.r
Sep  6 18:21:01 cumulus sshd[19143]: Failed password for r.r from 103.69.68.6 port 41425 ssh2
Sep  6 18:21:01 cumulus sshd[19143]: Received disconnect from 103.69.68.6 port 41425:11: Bye Bye [preauth]
Sep  6 18:21:01 cumulus sshd[19143]: Disconnected from 103.69.68.6 port 41425 [preauth]
Sep  6 18:38:30 cumulus sshd[20660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.69.68.6  user=r.r
Sep  6 18:38:31 cumulus sshd[20660]: Failed password for r.r from 103.69.68.6 port 34637 ssh2
Sep  6 18:38:32 cumulus sshd[20660]: Received disconnect from 103.69.68.6 port 34637:11: Bye Bye [preauth]
Sep  6 18:38:32 cumulus sshd[20660]: Disconnected from 103.69.68.6 port 34637 [preauth]
Sep  6 18:39:32 cumulus sshd[20847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ........
-------------------------------
2020-09-07 21:08:51
103.79.250.82 attackbotsspam
1599449392 - 09/07/2020 05:29:52 Host: 103.79.250.82/103.79.250.82 Port: 445 TCP Blocked
2020-09-07 21:45:27
117.212.53.111 attackspam
/wp-login.php
2020-09-07 21:15:06
180.76.169.198 attackbots
(sshd) Failed SSH login from 180.76.169.198 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 13:50:18 amsweb01 sshd[16274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198  user=root
Sep  7 13:50:21 amsweb01 sshd[16274]: Failed password for root from 180.76.169.198 port 51334 ssh2
Sep  7 14:01:50 amsweb01 sshd[17933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198  user=root
Sep  7 14:01:52 amsweb01 sshd[17933]: Failed password for root from 180.76.169.198 port 48068 ssh2
Sep  7 14:05:28 amsweb01 sshd[18462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.169.198  user=root
2020-09-07 21:14:31
106.12.59.23 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-07 21:28:41
87.1.81.21 attack
2020-09-06T18:53:31.109454 X postfix/smtpd[172461]: NOQUEUE: reject: RCPT from host-87-1-81-21.retail.telecomitalia.it[87.1.81.21]: 554 5.7.1 Service unavailable; Client host [87.1.81.21] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/87.1.81.21; from= to= proto=ESMTP helo=
2020-09-07 21:46:34
182.61.49.179 attackspambots
Sep  7 07:25:11 root sshd[6907]: Failed password for root from 182.61.49.179 port 35244 ssh2
...
2020-09-07 21:45:49
151.177.64.250 attackbotsspam
Honeypot attack, port: 5555, PTR: c151-177-64-250.bredband.comhem.se.
2020-09-07 21:29:54
218.92.0.184 attack
Sep  7 15:05:29 abendstille sshd\[8951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Sep  7 15:05:31 abendstille sshd\[8951\]: Failed password for root from 218.92.0.184 port 39640 ssh2
Sep  7 15:05:40 abendstille sshd\[8951\]: Failed password for root from 218.92.0.184 port 39640 ssh2
Sep  7 15:05:43 abendstille sshd\[8951\]: Failed password for root from 218.92.0.184 port 39640 ssh2
Sep  7 15:05:48 abendstille sshd\[9119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
...
2020-09-07 21:43:28
47.6.104.214 attackbots
SSH/22 MH Probe, BF, Hack -
2020-09-07 21:30:09
173.252.95.35 attack
Port Scan: TCP/80
2020-09-07 21:32:14
222.186.30.57 attack
Sep  7 06:19:52 dignus sshd[3273]: Failed password for root from 222.186.30.57 port 56937 ssh2
Sep  7 06:19:54 dignus sshd[3273]: Failed password for root from 222.186.30.57 port 56937 ssh2
Sep  7 06:19:56 dignus sshd[3283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Sep  7 06:19:58 dignus sshd[3283]: Failed password for root from 222.186.30.57 port 18331 ssh2
Sep  7 06:20:01 dignus sshd[3283]: Failed password for root from 222.186.30.57 port 18331 ssh2
...
2020-09-07 21:30:49

Recently Reported IPs

121.43.119.43 180.165.17.47 35.203.211.193 45.204.148.76
73.175.240.76 41.232.0.126 34.219.30.193 44.248.19.219
180.153.201.245 148.113.214.212 222.90.96.243 175.27.145.253
10.12.187.150 59.219.42.34 103.151.172.32 61.185.198.222
202.128.241.178 185.223.30.137 43.225.170.240 217.182.213.55