Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.94.115.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.94.115.82.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 13:08:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
82.115.94.121.in-addr.arpa domain name pointer ntkngw682082.kngw.nt.ngn.ppp.infoweb.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.115.94.121.in-addr.arpa	name = ntkngw682082.kngw.nt.ngn.ppp.infoweb.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.44.251.99 attackspambots
20/3/23@11:40:39: FAIL: Alarm-Network address from=178.44.251.99
...
2020-03-24 07:00:16
192.144.164.134 attackbotsspam
Invalid user sunsf from 192.144.164.134 port 18754
2020-03-24 07:04:32
190.191.163.43 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-03-24 06:49:36
162.243.132.34 attackbotsspam
Port 22 (SSH) access denied
2020-03-24 07:18:41
45.143.220.251 attack
firewall-block, port(s): 5062/udp
2020-03-24 06:47:30
134.209.182.198 attackspambots
3x Failed Password
2020-03-24 07:02:52
163.172.251.80 attack
(sshd) Failed SSH login from 163.172.251.80 (FR/France/163-172-251-80.rev.poneytelecom.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 22:21:36 srv sshd[5401]: Invalid user jc3 from 163.172.251.80 port 39796
Mar 23 22:21:38 srv sshd[5401]: Failed password for invalid user jc3 from 163.172.251.80 port 39796 ssh2
Mar 23 22:30:20 srv sshd[5623]: Invalid user ruby from 163.172.251.80 port 45888
Mar 23 22:30:22 srv sshd[5623]: Failed password for invalid user ruby from 163.172.251.80 port 45888 ssh2
Mar 23 22:34:02 srv sshd[5677]: Invalid user barclay from 163.172.251.80 port 33160
2020-03-24 06:59:55
170.130.187.22 attack
Honeypot hit.
2020-03-24 07:12:28
167.99.132.138 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-03-24 06:48:02
223.150.245.63 attackbotsspam
Automatic report - Port Scan Attack
2020-03-24 07:23:23
103.140.83.18 attackbotsspam
Mar 23 23:06:26 localhost sshd\[5137\]: Invalid user bkp from 103.140.83.18 port 37668
Mar 23 23:06:26 localhost sshd\[5137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.83.18
Mar 23 23:06:28 localhost sshd\[5137\]: Failed password for invalid user bkp from 103.140.83.18 port 37668 ssh2
2020-03-24 06:58:48
200.41.86.59 attackbots
SSH Invalid Login
2020-03-24 06:48:48
86.73.196.126 attackspambots
404 NOT FOUND
2020-03-24 07:22:59
80.20.133.206 attackbots
Lines containing failures of 80.20.133.206
Mar 23 17:58:26 shared04 sshd[28858]: Invalid user zg from 80.20.133.206 port 40240
Mar 23 17:58:26 shared04 sshd[28858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.20.133.206
Mar 23 17:58:28 shared04 sshd[28858]: Failed password for invalid user zg from 80.20.133.206 port 40240 ssh2
Mar 23 17:58:28 shared04 sshd[28858]: Received disconnect from 80.20.133.206 port 40240:11: Bye Bye [preauth]
Mar 23 17:58:28 shared04 sshd[28858]: Disconnected from invalid user zg 80.20.133.206 port 40240 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.20.133.206
2020-03-24 06:49:48
35.196.8.137 attackbotsspam
SSH Invalid Login
2020-03-24 06:57:37

Recently Reported IPs

15.193.54.215 251.41.2.79 165.115.133.126 51.13.160.128
19.146.182.0 146.125.88.13 23.34.198.201 75.154.92.93
125.166.168.12 215.146.38.233 37.152.93.167 144.63.213.173
75.157.97.73 13.19.44.106 30.199.90.235 63.193.120.40
107.202.183.48 63.145.106.51 66.250.114.164 159.82.232.52