Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
121.53.53.117 attackbots
Unauthorized connection attempt detected from IP address 121.53.53.117 to port 81
2020-01-01 03:14:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.53.5.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.53.5.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 08:17:05 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 69.5.53.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.5.53.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.131.21.222 attackbots
firewall-block, port(s): 8088/tcp
2020-10-09 08:00:34
5.141.98.155 attackbotsspam
1602103463 - 10/07/2020 22:44:23 Host: 5.141.98.155/5.141.98.155 Port: 445 TCP Blocked
2020-10-09 07:36:24
120.92.107.97 attackspambots
Oct  9 01:05:55 hell sshd[14200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.107.97
Oct  9 01:05:57 hell sshd[14200]: Failed password for invalid user usr from 120.92.107.97 port 2972 ssh2
...
2020-10-09 07:47:27
129.211.42.153 attackspam
2020-10-08 12:26:21 server sshd[14879]: Failed password for invalid user job from 129.211.42.153 port 53282 ssh2
2020-10-09 08:02:38
51.15.214.21 attack
Oct  9 02:01:20 buvik sshd[6595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.214.21
Oct  9 02:01:22 buvik sshd[6595]: Failed password for invalid user rpm from 51.15.214.21 port 55800 ssh2
Oct  9 02:04:13 buvik sshd[6974]: Invalid user mailman from 51.15.214.21
...
2020-10-09 08:06:08
114.35.29.111 attackbots
Found on   CINS badguys     / proto=6  .  srcport=41649  .  dstport=23 Telnet  .     (464)
2020-10-09 07:59:02
171.229.143.112 attackspam
Found on   CINS badguys     / proto=6  .  srcport=18442  .  dstport=23 Telnet  .     (4817)
2020-10-09 07:56:48
77.40.3.118 attackspam
Oct  8 22:09:32 mellenthin postfix/smtpd[10846]: warning: unknown[77.40.3.118]: SASL PLAIN authentication failed:
Oct  8 22:46:07 mellenthin postfix/smtpd[11783]: warning: unknown[77.40.3.118]: SASL PLAIN authentication failed:
2020-10-09 07:32:47
118.89.247.113 attack
Oct  9 01:07:32 vpn01 sshd[21894]: Failed password for root from 118.89.247.113 port 45402 ssh2
...
2020-10-09 07:57:23
222.186.15.62 attack
08.10.2020 23:33:12 SSH access blocked by firewall
2020-10-09 07:33:55
128.199.111.10 attackbotsspam
Oct  9 01:32:29 sso sshd[2212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.10
Oct  9 01:32:31 sso sshd[2212]: Failed password for invalid user user2004 from 128.199.111.10 port 36454 ssh2
...
2020-10-09 07:46:46
212.70.149.20 attack
Oct  9 01:53:58 galaxy event: galaxy/lswi: smtp: teodora@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct  9 01:54:22 galaxy event: galaxy/lswi: smtp: teresawinkymak@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct  9 01:54:47 galaxy event: galaxy/lswi: smtp: test02@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct  9 01:55:11 galaxy event: galaxy/lswi: smtp: test03@uni-potsdam.de [212.70.149.20] authentication failure using internet password
Oct  9 01:55:35 galaxy event: galaxy/lswi: smtp: test2@uni-potsdam.de [212.70.149.20] authentication failure using internet password
...
2020-10-09 07:57:10
37.187.154.33 attackbotsspam
[2020-10-08 19:21:08] NOTICE[1182] chan_sip.c: Registration from '' failed for '37.187.154.33:52178' - Wrong password
[2020-10-08 19:21:08] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-08T19:21:08.586-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="3512",SessionID="0x7f22f8418138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.187.154.33/52178",Challenge="3421b78c",ReceivedChallenge="3421b78c",ReceivedHash="8aa185a268d205310d271ec1bdd201da"
[2020-10-08 19:21:45] NOTICE[1182] chan_sip.c: Registration from '' failed for '37.187.154.33:58605' - Wrong password
[2020-10-08 19:21:45] SECURITY[1204] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-10-08T19:21:45.437-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="3513",SessionID="0x7f22f8572958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.187.154.33
...
2020-10-09 07:42:44
36.66.151.17 attack
$f2bV_matches
2020-10-09 07:51:52
202.158.62.240 attack
2020-10-08T16:46:44.175143linuxbox-skyline sshd[54766]: Invalid user josh from 202.158.62.240 port 42539
...
2020-10-09 07:43:31

Recently Reported IPs

75.30.11.132 4.219.136.71 93.252.185.47 48.74.30.52
242.244.73.111 112.159.7.158 50.208.11.10 155.79.10.207
202.5.238.29 231.200.160.249 40.250.78.10 252.130.12.188
223.79.21.148 157.164.242.68 3.199.134.114 153.202.103.84
226.147.23.67 161.141.148.49 237.67.60.108 150.179.183.175