Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.90.45.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.90.45.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:23:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 221.45.90.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.45.90.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
8.14.149.127 attackspam
SSH Brute Force
2020-03-27 14:59:40
49.232.165.42 attackbotsspam
Mar 27 05:03:42 localhost sshd\[4106\]: Invalid user ap from 49.232.165.42
Mar 27 05:03:42 localhost sshd\[4106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.165.42
Mar 27 05:03:44 localhost sshd\[4106\]: Failed password for invalid user ap from 49.232.165.42 port 38708 ssh2
Mar 27 05:07:02 localhost sshd\[4359\]: Invalid user test from 49.232.165.42
Mar 27 05:07:02 localhost sshd\[4359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.165.42
...
2020-03-27 15:45:11
123.152.7.239 attack
Mar 27 04:51:08 debian-2gb-nbg1-2 kernel: \[7540141.215505\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=123.152.7.239 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=34004 PROTO=TCP SPT=37114 DPT=23 WINDOW=42698 RES=0x00 SYN URGP=0
2020-03-27 15:26:04
58.17.243.151 attack
Invalid user cr from 58.17.243.151 port 17926
2020-03-27 15:00:52
65.92.61.65 attackbotsspam
Unauthorized connection attempt detected from IP address 65.92.61.65 to port 23
2020-03-27 15:20:36
182.50.135.68 attackbots
SQL injection:/international/mission/humanitaire/resultat_projets_jeunes.php?language=FR'&sub_menu_selected=1024'&menu_selected=144'&numero_page=161'"
2020-03-27 15:30:53
45.55.188.133 attackbotsspam
<6 unauthorized SSH connections
2020-03-27 15:33:33
183.82.121.34 attack
(sshd) Failed SSH login from 183.82.121.34 (IN/India/broadband.actcorp.in): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 08:44:51 s1 sshd[8986]: Invalid user api from 183.82.121.34 port 53574
Mar 27 08:44:53 s1 sshd[8986]: Failed password for invalid user api from 183.82.121.34 port 53574 ssh2
Mar 27 08:48:49 s1 sshd[9177]: Invalid user ecz from 183.82.121.34 port 50872
Mar 27 08:48:51 s1 sshd[9177]: Failed password for invalid user ecz from 183.82.121.34 port 50872 ssh2
Mar 27 08:51:20 s1 sshd[9282]: Invalid user centos from 183.82.121.34 port 33388
2020-03-27 15:03:38
208.53.40.2 attack
php vulnerability probing
2020-03-27 15:17:36
192.241.231.79 attack
Unauthorized connection attempt detected from IP address 192.241.231.79 to port 8889
2020-03-27 15:01:14
165.22.92.109 attackspambots
Brute-force attempt banned
2020-03-27 15:28:33
94.15.12.211 attack
Mar 27 08:16:37 tuxlinux sshd[11405]: Invalid user admin from 94.15.12.211 port 42624
Mar 27 08:16:37 tuxlinux sshd[11405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.15.12.211 
Mar 27 08:16:37 tuxlinux sshd[11405]: Invalid user admin from 94.15.12.211 port 42624
Mar 27 08:16:37 tuxlinux sshd[11405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.15.12.211 
Mar 27 08:16:37 tuxlinux sshd[11405]: Invalid user admin from 94.15.12.211 port 42624
Mar 27 08:16:37 tuxlinux sshd[11405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.15.12.211 
Mar 27 08:16:39 tuxlinux sshd[11405]: Failed password for invalid user admin from 94.15.12.211 port 42624 ssh2
...
2020-03-27 15:41:07
121.239.106.34 attackspam
Helo
2020-03-27 15:44:48
138.197.21.218 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-03-27 15:12:05
159.192.218.193 attackspam
1585281055 - 03/27/2020 04:50:55 Host: 159.192.218.193/159.192.218.193 Port: 445 TCP Blocked
2020-03-27 15:32:48

Recently Reported IPs

12.84.169.182 167.70.180.190 27.232.41.77 122.49.232.242
252.183.150.11 57.76.61.155 179.227.166.120 103.154.30.39
25.200.248.177 122.209.137.76 249.111.156.51 209.185.71.173
193.244.138.5 41.47.162.164 227.54.8.226 35.219.102.221
53.91.208.45 7.110.217.120 202.178.178.150 72.155.22.213