Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.44.16.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.44.16.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:48:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
99.16.44.121.in-addr.arpa domain name pointer 121-44-16-99.tpgi.com.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.16.44.121.in-addr.arpa	name = 121-44-16-99.tpgi.com.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.207.221.66 attackspam
2020-08-13T04:35:42.096979shield sshd\[29772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66  user=root
2020-08-13T04:35:43.421845shield sshd\[29772\]: Failed password for root from 124.207.221.66 port 35816 ssh2
2020-08-13T04:37:17.553840shield sshd\[30023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66  user=root
2020-08-13T04:37:19.255149shield sshd\[30023\]: Failed password for root from 124.207.221.66 port 57260 ssh2
2020-08-13T04:38:55.635922shield sshd\[30284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66  user=root
2020-08-13 12:42:01
157.245.37.160 attackspambots
2020-08-13T04:40:25.620631shield sshd\[30535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.37.160  user=root
2020-08-13T04:40:27.798550shield sshd\[30535\]: Failed password for root from 157.245.37.160 port 45526 ssh2
2020-08-13T04:42:51.414415shield sshd\[31012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.37.160  user=root
2020-08-13T04:42:53.307722shield sshd\[31012\]: Failed password for root from 157.245.37.160 port 57062 ssh2
2020-08-13T04:45:11.959413shield sshd\[31329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.37.160  user=root
2020-08-13 13:16:40
23.129.64.204 attackspambots
2020-08-13T06:10[Censored Hostname] sshd[5876]: Failed password for root from 23.129.64.204 port 43935 ssh2
2020-08-13T06:10[Censored Hostname] sshd[5876]: Failed password for root from 23.129.64.204 port 43935 ssh2
2020-08-13T06:10[Censored Hostname] sshd[5876]: Failed password for root from 23.129.64.204 port 43935 ssh2[...]
2020-08-13 12:59:29
117.211.192.70 attackspambots
SSH auth scanning - multiple failed logins
2020-08-13 12:50:10
158.69.197.113 attackspam
Aug 13 07:02:56 abendstille sshd\[23595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113  user=root
Aug 13 07:02:58 abendstille sshd\[23595\]: Failed password for root from 158.69.197.113 port 53852 ssh2
Aug 13 07:07:04 abendstille sshd\[27763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113  user=root
Aug 13 07:07:06 abendstille sshd\[27763\]: Failed password for root from 158.69.197.113 port 44482 ssh2
Aug 13 07:11:08 abendstille sshd\[32042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.197.113  user=root
...
2020-08-13 13:14:44
71.251.33.100 attackbots
Unauthorised access (Aug 13) SRC=71.251.33.100 LEN=40 TTL=51 ID=34216 TCP DPT=23 WINDOW=51850 SYN
2020-08-13 12:46:42
106.37.72.234 attackspambots
Aug 13 06:36:47 ns37 sshd[9907]: Failed password for root from 106.37.72.234 port 41370 ssh2
Aug 13 06:36:47 ns37 sshd[9907]: Failed password for root from 106.37.72.234 port 41370 ssh2
2020-08-13 12:52:43
202.137.134.220 attack
Dovecot Invalid User Login Attempt.
2020-08-13 12:40:43
118.25.106.244 attackspam
Aug 13 06:26:56 eventyay sshd[15071]: Failed password for root from 118.25.106.244 port 48806 ssh2
Aug 13 06:30:58 eventyay sshd[15169]: Failed password for root from 118.25.106.244 port 32928 ssh2
...
2020-08-13 12:34:55
216.104.200.2 attackbotsspam
Brute force attempt
2020-08-13 12:53:08
47.74.234.121 attackspambots
(sshd) Failed SSH login from 47.74.234.121 (SG/Singapore/-): 5 in the last 3600 secs
2020-08-13 12:51:56
201.87.233.60 attackspam
Unauthorised access (Aug 13) SRC=201.87.233.60 LEN=44 TOS=0x10 PREC=0x40 TTL=236 ID=35153 TCP DPT=445 WINDOW=1024 SYN
2020-08-13 13:07:17
87.251.74.30 attackspam
Aug 13 06:41:49 debian64 sshd[5110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.30 
...
2020-08-13 12:51:37
94.23.33.22 attackspam
$f2bV_matches
2020-08-13 13:14:16
105.27.173.38 attackspam
Honeypot hit.
2020-08-13 13:10:58

Recently Reported IPs

42.2.180.114 56.177.228.245 251.255.111.194 89.180.190.37
242.139.6.75 231.112.2.232 225.119.228.49 184.61.103.80
154.162.103.179 156.189.62.180 241.224.180.16 65.48.237.140
97.105.43.248 255.103.104.169 104.22.60.10 27.202.106.154
189.88.202.107 187.115.76.17 182.221.73.41 192.157.2.251