Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyoto

Region: Kyoto

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: OPTAGE Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.85.201.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.85.201.148.			IN	A

;; AUTHORITY SECTION:
.			121	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 23 00:08:34 CST 2019
;; MSG SIZE  rcvd: 118

Host info
148.201.85.121.in-addr.arpa domain name pointer 121-85-201-148f1.nar1.eonet.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.201.85.121.in-addr.arpa	name = 121-85-201-148f1.nar1.eonet.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.107.133.162 attackbotsspam
Mar 18 16:16:26 *** sshd[15012]: User root from 117.107.133.162 not allowed because not listed in AllowUsers
2020-03-19 01:56:27
180.76.155.19 attack
Mar 18 14:02:18 ns382633 sshd\[15787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.155.19  user=root
Mar 18 14:02:20 ns382633 sshd\[15787\]: Failed password for root from 180.76.155.19 port 59820 ssh2
Mar 18 14:09:05 ns382633 sshd\[16956\]: Invalid user ubuntu5 from 180.76.155.19 port 51846
Mar 18 14:09:05 ns382633 sshd\[16956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.155.19
Mar 18 14:09:08 ns382633 sshd\[16956\]: Failed password for invalid user ubuntu5 from 180.76.155.19 port 51846 ssh2
2020-03-19 01:34:07
210.14.96.194 spam
thurasoehtwe96955@gmail.com
2020-03-19 01:55:32
156.202.9.55 attackspambots
Autoban   156.202.9.55 AUTH/CONNECT
2020-03-19 01:47:20
37.17.172.152 attackspambots
Malicious Traffic/Form Submission
2020-03-19 01:45:21
150.109.47.167 attackbotsspam
$f2bV_matches
2020-03-19 01:26:43
62.234.97.142 attack
Mar 18 14:03:50 jane sshd[24720]: Failed password for root from 62.234.97.142 port 36528 ssh2
...
2020-03-19 01:57:29
51.79.68.147 attack
Invalid user deploy from 51.79.68.147 port 60324
2020-03-19 01:37:05
88.247.94.202 attackbotsspam
Automatic report - Port Scan Attack
2020-03-19 01:56:50
222.186.42.75 attackbotsspam
18.03.2020 17:45:39 SSH access blocked by firewall
2020-03-19 01:49:34
111.229.103.45 attackbots
$f2bV_matches
2020-03-19 01:37:24
5.8.10.202 attackspam
INFO Plain Text Over SSL
2020-03-19 01:43:05
46.105.149.168 attackbotsspam
Mar 18 18:13:37 ns37 sshd[23773]: Failed password for root from 46.105.149.168 port 45422 ssh2
Mar 18 18:18:02 ns37 sshd[24134]: Failed password for root from 46.105.149.168 port 38182 ssh2
Mar 18 18:22:25 ns37 sshd[24403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.149.168
2020-03-19 01:54:21
190.210.236.139 attack
SSH login attempts with user root.
2020-03-19 01:48:13
182.61.10.28 attackspambots
$f2bV_matches
2020-03-19 02:00:26

Recently Reported IPs

49.191.45.73 90.160.104.171 139.60.77.119 163.55.250.58
216.119.229.241 66.99.70.28 162.226.33.117 14.224.60.53
125.169.107.131 134.179.88.187 8.14.232.253 145.234.180.6
35.91.72.204 115.231.231.3 63.45.232.145 238.139.214.111
99.78.30.81 165.79.102.138 201.19.26.194 24.8.185.91