Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.121.164.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.121.164.221.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:20:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 221.164.121.135.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.164.121.135.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.149.46.198 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 12:30:13.
2020-03-28 01:59:13
51.159.28.242 attackspambots
" "
2020-03-28 02:37:04
49.37.136.191 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 12:30:13.
2020-03-28 01:59:43
200.41.86.59 attackspam
Invalid user fe from 200.41.86.59 port 55652
2020-03-28 02:37:18
194.152.12.121 attackbots
Invalid user pi from 194.152.12.121 port 47386
2020-03-28 02:03:44
154.16.202.212 attack
(smtpauth) Failed SMTP AUTH login from 154.16.202.212 (DE/Germany/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-27 19:56:34 login authenticator failed for (ADMIN) [154.16.202.212]: 535 Incorrect authentication data (set_id=info@taninsanat.com)
2020-03-28 02:29:50
51.68.229.73 attackbotsspam
2020-03-27T14:55:14.250847ionos.janbro.de sshd[130976]: Invalid user atkchance from 51.68.229.73 port 53568
2020-03-27T14:55:16.549013ionos.janbro.de sshd[130976]: Failed password for invalid user atkchance from 51.68.229.73 port 53568 ssh2
2020-03-27T14:58:36.442338ionos.janbro.de sshd[131007]: Invalid user khk from 51.68.229.73 port 37894
2020-03-27T14:58:36.755457ionos.janbro.de sshd[131007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.73
2020-03-27T14:58:36.442338ionos.janbro.de sshd[131007]: Invalid user khk from 51.68.229.73 port 37894
2020-03-27T14:58:38.990346ionos.janbro.de sshd[131007]: Failed password for invalid user khk from 51.68.229.73 port 37894 ssh2
2020-03-27T15:02:06.936219ionos.janbro.de sshd[131050]: Invalid user alex from 51.68.229.73 port 50454
2020-03-27T15:02:07.348911ionos.janbro.de sshd[131050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.73
2020-03-27T
...
2020-03-28 02:12:23
106.54.64.77 attack
Mar 27 18:14:06 master sshd[26980]: Failed password for invalid user shannon from 106.54.64.77 port 51568 ssh2
Mar 27 18:20:54 master sshd[27044]: Failed password for invalid user fhr from 106.54.64.77 port 44628 ssh2
Mar 27 18:25:03 master sshd[27047]: Failed password for invalid user wkj from 106.54.64.77 port 40768 ssh2
Mar 27 18:29:06 master sshd[27049]: Failed password for invalid user xug from 106.54.64.77 port 36908 ssh2
Mar 27 18:33:06 master sshd[27081]: Failed password for invalid user ezu from 106.54.64.77 port 33052 ssh2
Mar 27 18:37:04 master sshd[27085]: Failed password for invalid user coz from 106.54.64.77 port 57428 ssh2
Mar 27 18:40:55 master sshd[27088]: Failed password for invalid user zab from 106.54.64.77 port 53572 ssh2
Mar 27 18:44:43 master sshd[27090]: Failed password for invalid user smk from 106.54.64.77 port 49710 ssh2
Mar 27 18:48:30 master sshd[27108]: Failed password for invalid user dev from 106.54.64.77 port 45852 ssh2
2020-03-28 02:30:23
212.220.212.49 attack
SSH login attempts.
2020-03-28 02:29:09
84.236.147.147 attackspam
2020-03-27T19:21:37.889754ns386461 sshd\[24450\]: Invalid user lio from 84.236.147.147 port 43724
2020-03-27T19:21:37.894573ns386461 sshd\[24450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.147.147
2020-03-27T19:21:40.011514ns386461 sshd\[24450\]: Failed password for invalid user lio from 84.236.147.147 port 43724 ssh2
2020-03-27T19:33:03.874061ns386461 sshd\[2835\]: Invalid user mkwu from 84.236.147.147 port 52632
2020-03-27T19:33:03.878707ns386461 sshd\[2835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.236.147.147
...
2020-03-28 02:33:27
14.142.111.146 attackbots
Unauthorized connection attempt from IP address 14.142.111.146 on Port 445(SMB)
2020-03-28 02:10:11
173.255.249.78 attackspambots
7657/tcp
[2020-03-27]1pkt
2020-03-28 02:00:44
209.17.96.178 attackspambots
IP: 209.17.96.178
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 83%
Found in DNSBL('s)
ASN Details
   AS174 Cogent Communications
   United States (US)
   CIDR 209.17.96.0/20
Log Date: 27/03/2020 12:01:59 PM UTC
2020-03-28 02:24:48
14.254.65.152 attackbots
Unauthorized connection attempt from IP address 14.254.65.152 on Port 445(SMB)
2020-03-28 02:28:44
190.13.145.60 attackspam
SSH login attempts.
2020-03-28 02:22:23

Recently Reported IPs

243.21.36.23 228.72.71.164 13.131.69.51 68.1.69.39
161.228.152.0 218.92.199.217 104.150.208.173 33.37.232.217
155.110.100.255 38.231.232.190 39.81.141.228 200.153.222.80
81.158.76.6 221.40.188.136 231.197.113.185 76.212.5.107
162.16.187.123 2.202.135.183 44.65.112.27 164.163.163.133