Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Qingdao

Region: Shandong

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.42.130.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.42.130.126.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024100202 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 10:05:02 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 126.130.42.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.130.42.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.113.78.18 attack
" "
2019-12-06 13:04:18
106.13.87.145 attack
Dec  6 05:59:21 fr01 sshd[22741]: Invalid user pass1234567 from 106.13.87.145
...
2019-12-06 13:30:39
200.89.178.214 attack
Dec  5 20:08:19 XXX sshd[8147]: Invalid user guest from 200.89.178.214 port 56362
2019-12-06 10:15:06
49.234.28.54 attackbotsspam
Dec  6 11:52:51 itv-usvr-02 sshd[17438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54  user=backup
Dec  6 11:52:53 itv-usvr-02 sshd[17438]: Failed password for backup from 49.234.28.54 port 52638 ssh2
Dec  6 12:01:10 itv-usvr-02 sshd[17481]: Invalid user esmith from 49.234.28.54 port 45512
Dec  6 12:01:10 itv-usvr-02 sshd[17481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54
Dec  6 12:01:10 itv-usvr-02 sshd[17481]: Invalid user esmith from 49.234.28.54 port 45512
Dec  6 12:01:13 itv-usvr-02 sshd[17481]: Failed password for invalid user esmith from 49.234.28.54 port 45512 ssh2
2019-12-06 13:13:20
123.207.188.95 attackspam
2019-12-06T05:00:12.143501hub.schaetter.us sshd\[28444\]: Invalid user vmchange from 123.207.188.95 port 54742
2019-12-06T05:00:12.152192hub.schaetter.us sshd\[28444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.188.95
2019-12-06T05:00:14.267934hub.schaetter.us sshd\[28444\]: Failed password for invalid user vmchange from 123.207.188.95 port 54742 ssh2
2019-12-06T05:07:58.198539hub.schaetter.us sshd\[28608\]: Invalid user nimphius from 123.207.188.95 port 60134
2019-12-06T05:07:58.205687hub.schaetter.us sshd\[28608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.188.95
...
2019-12-06 13:18:26
130.162.64.72 attack
Dec  6 07:35:47 vtv3 sshd[32581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72 
Dec  6 07:35:50 vtv3 sshd[32581]: Failed password for invalid user toni from 130.162.64.72 port 64323 ssh2
Dec  6 07:41:50 vtv3 sshd[3302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72 
Dec  6 07:54:12 vtv3 sshd[9486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72 
Dec  6 07:54:14 vtv3 sshd[9486]: Failed password for invalid user karlsdottir from 130.162.64.72 port 51518 ssh2
Dec  6 08:00:32 vtv3 sshd[12824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72
2019-12-06 13:03:17
122.114.155.196 attackspambots
2019-12-06T04:59:59.940204abusebot.cloudsearch.cf sshd\[2894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.155.196  user=root
2019-12-06 13:01:23
103.55.91.51 attackspam
SSH Brute-Force attacks
2019-12-06 13:07:01
134.209.70.255 attack
Dec  6 00:22:13 TORMINT sshd\[9605\]: Invalid user mangue from 134.209.70.255
Dec  6 00:22:13 TORMINT sshd\[9605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.70.255
Dec  6 00:22:15 TORMINT sshd\[9605\]: Failed password for invalid user mangue from 134.209.70.255 port 38896 ssh2
...
2019-12-06 13:26:35
190.129.173.157 attack
Dec  6 06:03:15 ns382633 sshd\[5692\]: Invalid user yudistira from 190.129.173.157 port 18310
Dec  6 06:03:15 ns382633 sshd\[5692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.173.157
Dec  6 06:03:16 ns382633 sshd\[5692\]: Failed password for invalid user yudistira from 190.129.173.157 port 18310 ssh2
Dec  6 06:15:48 ns382633 sshd\[8109\]: Invalid user smith from 190.129.173.157 port 14049
Dec  6 06:15:48 ns382633 sshd\[8109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.173.157
2019-12-06 13:24:27
151.80.60.151 attackspam
Dec  6 05:57:37 lnxmysql61 sshd[31291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.60.151
Dec  6 05:57:38 lnxmysql61 sshd[31291]: Failed password for invalid user vagrant from 151.80.60.151 port 42946 ssh2
Dec  6 06:05:15 lnxmysql61 sshd[553]: Failed password for root from 151.80.60.151 port 54144 ssh2
2019-12-06 13:30:26
92.207.180.50 attackspambots
Dec  5 18:54:19 wbs sshd\[16474\]: Invalid user jachmann from 92.207.180.50
Dec  5 18:54:19 wbs sshd\[16474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50
Dec  5 18:54:21 wbs sshd\[16474\]: Failed password for invalid user jachmann from 92.207.180.50 port 48375 ssh2
Dec  5 18:59:51 wbs sshd\[16958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50  user=root
Dec  5 18:59:53 wbs sshd\[16958\]: Failed password for root from 92.207.180.50 port 53227 ssh2
2019-12-06 13:06:46
14.169.74.174 attackspam
Unauthorised access (Dec  6) SRC=14.169.74.174 LEN=52 TTL=116 ID=21161 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-06 13:31:00
106.13.56.12 attackspambots
Dec  6 11:52:40 lcl-usvr-02 sshd[25739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.12  user=root
Dec  6 11:52:42 lcl-usvr-02 sshd[25739]: Failed password for root from 106.13.56.12 port 43368 ssh2
Dec  6 12:00:00 lcl-usvr-02 sshd[27364]: Invalid user attack from 106.13.56.12 port 42972
Dec  6 12:00:00 lcl-usvr-02 sshd[27364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.12
Dec  6 12:00:00 lcl-usvr-02 sshd[27364]: Invalid user attack from 106.13.56.12 port 42972
Dec  6 12:00:03 lcl-usvr-02 sshd[27364]: Failed password for invalid user attack from 106.13.56.12 port 42972 ssh2
...
2019-12-06 13:04:43
80.24.111.17 attackbotsspam
Dec  6 06:18:51 mail sshd\[4561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.24.111.17  user=root
Dec  6 06:18:54 mail sshd\[4561\]: Failed password for root from 80.24.111.17 port 58770 ssh2
Dec  6 06:24:32 mail sshd\[4717\]: Invalid user pondering from 80.24.111.17
Dec  6 06:24:32 mail sshd\[4717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.24.111.17
...
2019-12-06 13:28:42

Recently Reported IPs

247.63.136.247 118.120.85.108 163.96.48.184 5.222.71.146
208.248.34.236 209.78.199.113 141.194.64.109 44.33.204.95
219.100.51.145 232.178.229.113 29.4.107.75 117.136.65.87
162.186.62.58 54.39.63.221 123.223.171.36 172.217.174.130
171.61.168.229 247.26.248.34 40.13.81.180 96.126.189.88