Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: Vodafone New Zealand

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Aug 18 19:08:18 hpm sshd\[16472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.75.14.148  user=root
Aug 18 19:08:21 hpm sshd\[16472\]: Failed password for root from 121.75.14.148 port 52818 ssh2
Aug 18 19:14:11 hpm sshd\[17001\]: Invalid user amir from 121.75.14.148
Aug 18 19:14:11 hpm sshd\[17001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.75.14.148
Aug 18 19:14:14 hpm sshd\[17001\]: Failed password for invalid user amir from 121.75.14.148 port 33974 ssh2
2020-08-19 13:28:12
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.75.14.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.75.14.148.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081802 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 19 13:28:09 CST 2020
;; MSG SIZE  rcvd: 117
Host info
148.14.75.121.in-addr.arpa domain name pointer 121-75-14-148.dyn.vf.net.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.14.75.121.in-addr.arpa	name = 121-75-14-148.dyn.vf.net.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.200.58.178 attackbots
Brute-force attempt banned
2020-03-29 04:57:08
167.99.194.54 attack
SSH Brute-Force attacks
2020-03-29 04:56:49
200.116.3.133 attack
Mar 28 17:40:15 firewall sshd[5155]: Invalid user kgq from 200.116.3.133
Mar 28 17:40:17 firewall sshd[5155]: Failed password for invalid user kgq from 200.116.3.133 port 55686 ssh2
Mar 28 17:44:30 firewall sshd[5416]: Invalid user jbf from 200.116.3.133
...
2020-03-29 05:15:50
77.232.100.253 attackbotsspam
Lines containing failures of 77.232.100.253
Mar 28 17:36:11 UTC__SANYALnet-Labs__cac12 sshd[1858]: Connection from 77.232.100.253 port 51854 on 45.62.253.138 port 22
Mar 28 17:36:12 UTC__SANYALnet-Labs__cac12 sshd[1858]: Invalid user atk from 77.232.100.253 port 51854
Mar 28 17:36:12 UTC__SANYALnet-Labs__cac12 sshd[1858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.253
Mar 28 17:36:14 UTC__SANYALnet-Labs__cac12 sshd[1858]: Failed password for invalid user atk from 77.232.100.253 port 51854 ssh2
Mar 28 17:36:14 UTC__SANYALnet-Labs__cac12 sshd[1858]: Received disconnect from 77.232.100.253 port 51854:11: Bye Bye [preauth]
Mar 28 17:36:14 UTC__SANYALnet-Labs__cac12 sshd[1858]: Disconnected from 77.232.100.253 port 51854 [preauth]
Mar 28 17:50:00 UTC__SANYALnet-Labs__cac12 sshd[2144]: Connection from 77.232.100.253 port 39482 on 45.62.253.138 port 22
Mar 28 17:50:01 UTC__SANYALnet-Labs__cac12 sshd[2144]: Invalid user hxm........
------------------------------
2020-03-29 05:01:25
104.155.213.9 attackbotsspam
Mar 28 18:15:00 ourumov-web sshd\[14963\]: Invalid user jira from 104.155.213.9 port 43332
Mar 28 18:15:00 ourumov-web sshd\[14963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.155.213.9
Mar 28 18:15:02 ourumov-web sshd\[14963\]: Failed password for invalid user jira from 104.155.213.9 port 43332 ssh2
...
2020-03-29 04:56:21
94.247.241.70 attack
Mar 28 13:38:29  exim[25814]: [1\33] 1jIAjN-0006iM-G0 H=(94-247-241-70.westcall.net) [94.247.241.70] F= rejected after DATA: This message scored 104.8 spam points.
2020-03-29 04:59:49
77.45.226.81 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-29 05:23:57
49.235.81.23 attackspambots
Mar 28 21:30:48 vpn01 sshd[7542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.81.23
Mar 28 21:30:49 vpn01 sshd[7542]: Failed password for invalid user eql from 49.235.81.23 port 59490 ssh2
...
2020-03-29 04:56:34
96.114.71.146 attackbotsspam
[ssh] SSH attack
2020-03-29 05:06:21
185.47.65.30 attackspam
Fail2Ban Ban Triggered
2020-03-29 05:08:57
78.185.165.87 attackspambots
Automatic report - Port Scan Attack
2020-03-29 05:02:35
159.65.41.159 attack
Mar 28 14:18:59 [munged] sshd[21052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.41.159
2020-03-29 05:09:46
61.9.53.10 attackbotsspam
[27/Mar/2020:01:37:03 -0400] "GET / HTTP/1.1" Safari 9.1.2 UA
2020-03-29 04:51:26
199.83.207.6 attack
TCP Port Scanning
2020-03-29 04:58:40
45.55.231.94 attackbotsspam
Mar 28 15:45:26 sshgateway sshd\[25345\]: Invalid user qan from 45.55.231.94
Mar 28 15:45:26 sshgateway sshd\[25345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.231.94
Mar 28 15:45:28 sshgateway sshd\[25345\]: Failed password for invalid user qan from 45.55.231.94 port 55506 ssh2
2020-03-29 05:07:04

Recently Reported IPs

39.153.252.94 78.129.201.60 198.199.122.153 61.7.187.123
206.189.176.134 93.46.168.185 183.80.67.207 103.211.240.30
110.244.211.148 132.255.84.81 168.244.245.39 41.118.76.111
122.61.27.10 87.90.149.110 139.1.120.112 93.66.201.212
127.75.158.45 217.65.137.188 146.238.148.230 61.80.22.44