Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Auckland

Region: Auckland

Country: New Zealand

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.74.210.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.74.210.125.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091701 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 18 09:11:33 CST 2020
;; MSG SIZE  rcvd: 118
Host info
125.210.74.121.in-addr.arpa domain name pointer 121-74-210-125.telstraclear.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.210.74.121.in-addr.arpa	name = 121-74-210-125.telstraclear.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.124.70.22 attack
Port scan: Attack repeated for 24 hours
2020-08-20 16:32:30
185.94.111.1 attack
 UDP 185.94.111.1:59744 -> port 389, len 68
2020-08-20 16:21:17
27.147.207.99 attack
Invalid user avanthi from 27.147.207.99 port 56811
2020-08-20 16:58:34
190.194.152.238 attack
Invalid user rena from 190.194.152.238 port 33780
2020-08-20 16:27:41
121.46.26.17 attackspambots
Aug 20 01:44:01 mail sshd\[33589\]: Invalid user minera from 121.46.26.17
Aug 20 01:44:01 mail sshd\[33589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.26.17
...
2020-08-20 16:19:46
51.195.47.153 attack
SSH Login Bruteforce
2020-08-20 16:54:28
207.246.240.120 attackbotsspam
Automatic report - XMLRPC Attack
2020-08-20 16:35:45
37.173.133.70 attackspam
1597895423 - 08/20/2020 05:50:23 Host: 37.173.133.70/37.173.133.70 Port: 445 TCP Blocked
2020-08-20 16:50:05
1.34.144.128 attackbotsspam
Invalid user jr from 1.34.144.128 port 46782
2020-08-20 16:33:51
111.231.115.43 attackspam
$f2bV_matches
2020-08-20 16:38:39
109.238.220.136 attack
$f2bV_matches
2020-08-20 16:21:00
49.88.112.68 attack
Aug 20 08:18:19 onepixel sshd[1308666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Aug 20 08:18:21 onepixel sshd[1308666]: Failed password for root from 49.88.112.68 port 28249 ssh2
Aug 20 08:18:19 onepixel sshd[1308666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Aug 20 08:18:21 onepixel sshd[1308666]: Failed password for root from 49.88.112.68 port 28249 ssh2
Aug 20 08:18:25 onepixel sshd[1308666]: Failed password for root from 49.88.112.68 port 28249 ssh2
2020-08-20 16:31:00
190.171.133.10 attack
Aug 20 07:53:19 ift sshd\[42596\]: Invalid user test2 from 190.171.133.10Aug 20 07:53:21 ift sshd\[42596\]: Failed password for invalid user test2 from 190.171.133.10 port 49146 ssh2Aug 20 07:57:42 ift sshd\[43248\]: Invalid user lcc from 190.171.133.10Aug 20 07:57:44 ift sshd\[43248\]: Failed password for invalid user lcc from 190.171.133.10 port 57490 ssh2Aug 20 08:02:22 ift sshd\[43923\]: Failed password for root from 190.171.133.10 port 37604 ssh2
...
2020-08-20 16:59:54
206.167.33.43 attackspambots
Aug 20 10:02:38 home sshd[2086977]: Failed password for invalid user testuser1 from 206.167.33.43 port 41880 ssh2
Aug 20 10:04:26 home sshd[2087652]: Invalid user ansible from 206.167.33.43 port 33012
Aug 20 10:04:26 home sshd[2087652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.43 
Aug 20 10:04:26 home sshd[2087652]: Invalid user ansible from 206.167.33.43 port 33012
Aug 20 10:04:28 home sshd[2087652]: Failed password for invalid user ansible from 206.167.33.43 port 33012 ssh2
...
2020-08-20 16:32:45
149.202.45.11 attackspam
Automatic report generated by Wazuh
2020-08-20 16:50:52

Recently Reported IPs

69.75.93.17 93.247.251.190 217.72.48.61 159.250.59.112
217.144.92.84 99.160.65.234 177.204.43.149 219.103.128.231
84.63.176.188 141.52.22.146 171.36.134.69 14.175.55.193
78.15.156.119 125.253.1.171 185.124.185.142 78.102.217.130
168.181.180.49 176.74.86.184 117.153.192.178 12.106.66.124