Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.61.34.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.61.34.114.			IN	A

;; AUTHORITY SECTION:
.			358	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 00:18:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 114.34.61.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.34.61.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.172.159 attackspam
2020-10-07T22:13:26.482121server.espacesoutien.com sshd[25142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.172.159  user=root
2020-10-07T22:13:28.813902server.espacesoutien.com sshd[25142]: Failed password for root from 159.203.172.159 port 54560 ssh2
2020-10-07T22:16:39.198952server.espacesoutien.com sshd[29591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.172.159  user=root
2020-10-07T22:16:41.022986server.espacesoutien.com sshd[29591]: Failed password for root from 159.203.172.159 port 60666 ssh2
...
2020-10-08 07:23:06
182.151.37.230 attackspambots
Oct  7 15:42:34 mx sshd[3098]: Failed password for root from 182.151.37.230 port 49628 ssh2
2020-10-08 07:05:44
61.177.172.89 attackbots
Oct  8 02:15:01 dignus sshd[31135]: Failed password for root from 61.177.172.89 port 56608 ssh2
Oct  8 02:15:05 dignus sshd[31135]: Failed password for root from 61.177.172.89 port 56608 ssh2
Oct  8 02:15:08 dignus sshd[31135]: Failed password for root from 61.177.172.89 port 56608 ssh2
Oct  8 02:15:11 dignus sshd[31135]: Failed password for root from 61.177.172.89 port 56608 ssh2
Oct  8 02:15:14 dignus sshd[31135]: Failed password for root from 61.177.172.89 port 56608 ssh2
...
2020-10-08 07:15:30
93.170.36.2 attackspambots
$f2bV_matches
2020-10-08 07:30:23
124.40.244.254 attackspambots
Oct  8 00:57:58 * sshd[25721]: Failed password for root from 124.40.244.254 port 60960 ssh2
2020-10-08 07:37:22
197.54.246.103 attack
Port probing on unauthorized port 23
2020-10-08 07:07:17
212.70.149.20 attackspam
Rude login attack (3415 tries in 1d)
2020-10-08 07:04:57
81.68.203.111 attackspambots
Oct  7 21:49:36 scw-6657dc sshd[14260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.203.111  user=root
Oct  7 21:49:36 scw-6657dc sshd[14260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.203.111  user=root
Oct  7 21:49:38 scw-6657dc sshd[14260]: Failed password for root from 81.68.203.111 port 48594 ssh2
...
2020-10-08 07:22:23
120.237.140.219 attack
5x Failed Password
2020-10-08 07:18:06
95.79.91.76 attackspambots
\[Wed Oct 07 23:47:03.628472 2020\] \[authz_core:error\] \[pid 33662\] \[client 95.79.91.76:39952\] AH01630: client denied by server configuration: /usr/lib/cgi-bin/
\[Wed Oct 07 23:47:07.182828 2020\] \[access_compat:error\] \[pid 33771\] \[client 95.79.91.76:41384\] AH01797: client denied by server configuration: /usr/share/doc/
\[Wed Oct 07 23:47:27.208954 2020\] \[access_compat:error\] \[pid 33794\] \[client 95.79.91.76:49464\] AH01797: client denied by server configuration: /usr/share/phpmyadmin/
...
2020-10-08 07:39:20
222.186.42.137 attack
2020-10-08T01:06:17.011883mail.broermann.family sshd[26698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-10-08T01:06:18.860184mail.broermann.family sshd[26698]: Failed password for root from 222.186.42.137 port 40844 ssh2
2020-10-08T01:06:17.011883mail.broermann.family sshd[26698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-10-08T01:06:18.860184mail.broermann.family sshd[26698]: Failed password for root from 222.186.42.137 port 40844 ssh2
2020-10-08T01:06:21.340892mail.broermann.family sshd[26698]: Failed password for root from 222.186.42.137 port 40844 ssh2
...
2020-10-08 07:06:49
14.157.101.128 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 07:04:22
103.231.65.3 attackspambots
Oct  7 15:19:45 mockhub sshd[798023]: Failed password for root from 103.231.65.3 port 63758 ssh2
Oct  7 15:22:59 mockhub sshd[798122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.231.65.3  user=root
Oct  7 15:23:02 mockhub sshd[798122]: Failed password for root from 103.231.65.3 port 50168 ssh2
...
2020-10-08 07:15:03
51.75.210.209 attackbotsspam
Oct  8 04:01:47 gw1 sshd[30432]: Failed password for root from 51.75.210.209 port 33632 ssh2
...
2020-10-08 07:30:42
176.109.0.30 attackspam
$f2bV_matches
2020-10-08 07:16:29

Recently Reported IPs

121.61.34.112 121.61.34.12 121.61.34.127 121.61.34.131
121.61.34.137 121.61.34.138 121.61.34.142 121.61.34.150
121.61.34.156 121.61.34.186 121.61.34.200 121.61.34.214
121.61.34.225 121.61.34.239 121.61.34.242 121.61.34.25
121.61.34.250 121.61.34.31 121.61.34.45 226.159.213.115