Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.75.206.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.75.206.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:55:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
16.206.75.121.in-addr.arpa domain name pointer 121-75-206-16.dyn.vf.net.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.206.75.121.in-addr.arpa	name = 121-75-206-16.dyn.vf.net.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
174.243.97.222 attack
Brute forcing email accounts
2020-10-11 12:58:42
192.35.168.124 attackbotsspam
 UDP 192.35.168.124:43103 -> port 53, len 57
2020-10-11 13:17:26
95.59.171.230 attackspam
Brute forcing RDP port 3389
2020-10-11 13:32:00
218.92.0.168 attackspam
2020-10-11T08:14:26.312862afi-git.jinr.ru sshd[25007]: Failed password for root from 218.92.0.168 port 22696 ssh2
2020-10-11T08:14:29.509250afi-git.jinr.ru sshd[25007]: Failed password for root from 218.92.0.168 port 22696 ssh2
2020-10-11T08:14:33.830184afi-git.jinr.ru sshd[25007]: Failed password for root from 218.92.0.168 port 22696 ssh2
2020-10-11T08:14:33.830356afi-git.jinr.ru sshd[25007]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 22696 ssh2 [preauth]
2020-10-11T08:14:33.830374afi-git.jinr.ru sshd[25007]: Disconnecting: Too many authentication failures [preauth]
...
2020-10-11 13:20:14
223.197.151.55 attackbotsspam
Oct 11 05:19:32 *hidden* sshd[21017]: Failed password for *hidden* from 223.197.151.55 port 35489 ssh2 Oct 11 05:21:38 *hidden* sshd[21372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.151.55 user=root Oct 11 05:21:40 *hidden* sshd[21372]: Failed password for *hidden* from 223.197.151.55 port 52987 ssh2
2020-10-11 13:24:19
122.51.206.41 attack
Oct 11 02:24:09 web-main sshd[3040441]: Failed password for root from 122.51.206.41 port 56112 ssh2
Oct 11 02:26:42 web-main sshd[3040805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.206.41  user=root
Oct 11 02:26:44 web-main sshd[3040805]: Failed password for root from 122.51.206.41 port 56758 ssh2
2020-10-11 13:17:59
194.61.27.248 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-11 13:07:56
106.252.164.246 attackbots
Oct 11 05:44:15 ns308116 sshd[21042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.252.164.246  user=root
Oct 11 05:44:16 ns308116 sshd[21042]: Failed password for root from 106.252.164.246 port 56671 ssh2
Oct 11 05:46:40 ns308116 sshd[21735]: Invalid user test2004 from 106.252.164.246 port 44133
Oct 11 05:46:40 ns308116 sshd[21735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.252.164.246
Oct 11 05:46:42 ns308116 sshd[21735]: Failed password for invalid user test2004 from 106.252.164.246 port 44133 ssh2
...
2020-10-11 13:35:05
183.154.27.196 attack
Oct 11 00:11:06 srv01 postfix/smtpd\[30854\]: warning: unknown\[183.154.27.196\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 00:24:52 srv01 postfix/smtpd\[24001\]: warning: unknown\[183.154.27.196\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 00:25:04 srv01 postfix/smtpd\[24001\]: warning: unknown\[183.154.27.196\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 00:25:20 srv01 postfix/smtpd\[24001\]: warning: unknown\[183.154.27.196\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 11 00:25:39 srv01 postfix/smtpd\[24001\]: warning: unknown\[183.154.27.196\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-11 13:07:40
45.148.10.28 attackbots
Invalid user admin from 45.148.10.28 port 54486
2020-10-11 13:02:47
119.45.213.69 attackbots
Oct 10 22:54:38 gospond sshd[6270]: Failed password for root from 119.45.213.69 port 47888 ssh2
Oct 10 22:54:36 gospond sshd[6270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.213.69  user=root
Oct 10 22:54:38 gospond sshd[6270]: Failed password for root from 119.45.213.69 port 47888 ssh2
...
2020-10-11 12:57:14
164.100.13.91 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-10-11 13:22:55
177.21.195.122 attackspam
Brute force attempt
2020-10-11 12:58:15
222.186.30.57 attack
Unauthorized connection attempt detected from IP address 222.186.30.57 to port 22 [T]
2020-10-11 13:37:22
218.92.0.176 attack
Oct 11 06:57:57 mail sshd[15165]: Failed password for root from 218.92.0.176 port 52616 ssh2
Oct 11 06:58:02 mail sshd[15165]: Failed password for root from 218.92.0.176 port 52616 ssh2
...
2020-10-11 13:05:53

Recently Reported IPs

96.194.10.5 251.150.249.198 48.65.8.119 184.163.134.185
129.15.24.252 86.14.6.166 228.25.202.74 161.245.118.212
84.247.42.225 78.17.25.136 33.127.18.137 62.14.34.35
72.27.26.74 200.193.205.65 190.11.13.199 219.80.98.180
126.161.199.162 65.255.87.57 9.230.237.20 254.80.250.80