Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.121.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.121.21.			IN	A

;; AUTHORITY SECTION:
.			581	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:19:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
21.121.207.14.in-addr.arpa domain name pointer mx-ll-14.207.121-21.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.121.207.14.in-addr.arpa	name = mx-ll-14.207.121-21.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.230.137.198 attack
Unauthorized connection attempt from IP address 61.230.137.198 on Port 445(SMB)
2020-05-25 23:37:03
220.247.237.230 attackbotsspam
May 25 14:37:28 legacy sshd[7037]: Failed password for root from 220.247.237.230 port 51630 ssh2
May 25 14:41:50 legacy sshd[7202]: Failed password for root from 220.247.237.230 port 58626 ssh2
May 25 14:46:11 legacy sshd[7395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.237.230
...
2020-05-25 23:16:18
42.81.160.213 attackspam
May 25 16:53:17 ift sshd\[56185\]: Failed password for root from 42.81.160.213 port 57460 ssh2May 25 16:57:21 ift sshd\[56670\]: Invalid user sshuser from 42.81.160.213May 25 16:57:22 ift sshd\[56670\]: Failed password for invalid user sshuser from 42.81.160.213 port 48158 ssh2May 25 17:01:38 ift sshd\[57491\]: Invalid user tom from 42.81.160.213May 25 17:01:39 ift sshd\[57491\]: Failed password for invalid user tom from 42.81.160.213 port 38880 ssh2
...
2020-05-25 23:03:30
188.70.4.233 attack
Unauthorized connection attempt from IP address 188.70.4.233 on Port 445(SMB)
2020-05-25 23:41:39
178.62.75.60 attack
May 25 17:18:11 electroncash sshd[4954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60 
May 25 17:18:11 electroncash sshd[4954]: Invalid user madlen from 178.62.75.60 port 35484
May 25 17:18:13 electroncash sshd[4954]: Failed password for invalid user madlen from 178.62.75.60 port 35484 ssh2
May 25 17:21:43 electroncash sshd[5943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60  user=root
May 25 17:21:46 electroncash sshd[5943]: Failed password for root from 178.62.75.60 port 40984 ssh2
...
2020-05-25 23:42:13
217.182.120.32 attackbots
Automatic report - XMLRPC Attack
2020-05-25 23:26:06
103.25.6.115 attack
Unauthorized connection attempt from IP address 103.25.6.115 on Port 445(SMB)
2020-05-25 23:12:55
141.98.9.160 attackspambots
May 25 12:03:40 firewall sshd[20610]: Invalid user user from 141.98.9.160
May 25 12:03:42 firewall sshd[20610]: Failed password for invalid user user from 141.98.9.160 port 36147 ssh2
May 25 12:04:15 firewall sshd[20654]: Invalid user guest from 141.98.9.160
...
2020-05-25 23:26:33
129.204.186.151 attackspambots
May 25 13:47:06 master sshd[15457]: Failed password for root from 129.204.186.151 port 46474 ssh2
May 25 13:58:45 master sshd[15512]: Failed password for root from 129.204.186.151 port 36596 ssh2
May 25 14:04:37 master sshd[15933]: Failed password for root from 129.204.186.151 port 42390 ssh2
May 25 14:10:27 master sshd[16018]: Failed password for root from 129.204.186.151 port 48186 ssh2
May 25 14:16:15 master sshd[16066]: Failed password for root from 129.204.186.151 port 53980 ssh2
May 25 14:22:03 master sshd[16114]: Failed password for root from 129.204.186.151 port 59764 ssh2
May 25 14:27:48 master sshd[16126]: Failed password for root from 129.204.186.151 port 37324 ssh2
May 25 14:33:32 master sshd[16551]: Failed password for invalid user wwwwww from 129.204.186.151 port 43124 ssh2
May 25 14:39:16 master sshd[16601]: Failed password for invalid user norcon from 129.204.186.151 port 48930 ssh2
May 25 14:44:55 master sshd[16658]: Failed password for root from 129.204.186.151 port 54714 ssh2
2020-05-25 23:04:33
200.46.114.114 attack
Unauthorized connection attempt from IP address 200.46.114.114 on Port 445(SMB)
2020-05-25 23:18:10
5.2.209.161 attack
Unauthorized connection attempt from IP address 5.2.209.161 on Port 445(SMB)
2020-05-25 23:24:06
91.121.145.227 attackspambots
May 25 09:10:57 server1 sshd\[29830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.145.227  user=root
May 25 09:10:59 server1 sshd\[29830\]: Failed password for root from 91.121.145.227 port 36718 ssh2
May 25 09:14:14 server1 sshd\[30742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.145.227  user=root
May 25 09:14:16 server1 sshd\[30742\]: Failed password for root from 91.121.145.227 port 38238 ssh2
May 25 09:17:39 server1 sshd\[31682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.145.227  user=root
...
2020-05-25 23:23:32
181.118.94.57 attack
Failed password for invalid user nexus from 181.118.94.57 port 37930 ssh2
2020-05-25 23:17:03
113.190.153.27 attack
Brute force attempt
2020-05-25 23:43:03
196.234.13.130 attackbotsspam
Unauthorized connection attempt from IP address 196.234.13.130 on Port 445(SMB)
2020-05-25 23:28:56

Recently Reported IPs

14.207.121.218 14.207.121.214 14.207.121.221 14.207.121.223
14.207.121.225 14.207.121.230 14.207.121.234 14.207.121.238
14.207.121.226 14.207.121.24 14.207.121.246 14.207.121.240
14.207.121.250 14.207.122.212 14.207.122.200 14.207.122.197
14.207.122.211 14.207.122.205 14.207.122.214 14.207.122.22