Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jerusalem

Region: Jerusalem

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: Internet Rimon LTD

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.138.121.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 863
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.138.121.212.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 18 04:37:54 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 212.121.138.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 212.121.138.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.37.156.188 attack
Invalid user daniel from 54.37.156.188 port 44528
2020-06-20 16:55:24
157.230.230.215 attackbots
Jun 20 09:42:50 srv01 postfix/smtpd\[21585\]: warning: unknown\[157.230.230.215\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 20 09:42:55 srv01 postfix/smtpd\[18129\]: warning: unknown\[157.230.230.215\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 20 09:42:55 srv01 postfix/smtpd\[21753\]: warning: unknown\[157.230.230.215\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 20 09:42:55 srv01 postfix/smtpd\[19454\]: warning: unknown\[157.230.230.215\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 20 09:59:47 srv01 postfix/smtpd\[21753\]: warning: unknown\[157.230.230.215\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-20 16:45:25
129.211.174.145 attackspambots
Invalid user aj from 129.211.174.145 port 43762
2020-06-20 16:42:15
112.217.207.130 attackspam
Invalid user ysw from 112.217.207.130 port 53262
2020-06-20 16:52:17
104.211.216.173 attackspambots
Invalid user laci from 104.211.216.173 port 36474
2020-06-20 16:26:47
218.93.225.150 attack
Invalid user lzl from 218.93.225.150 port 10724
2020-06-20 16:39:28
138.68.94.173 attack
(sshd) Failed SSH login from 138.68.94.173 (DE/Germany/-): 12 in the last 3600 secs
2020-06-20 16:45:55
182.61.104.246 attackspambots
Invalid user webmaster from 182.61.104.246 port 21285
2020-06-20 16:51:10
51.254.38.106 attackspambots
Jun 20 09:52:08 sip sshd[710899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.38.106  user=mail
Jun 20 09:52:10 sip sshd[710899]: Failed password for mail from 51.254.38.106 port 41145 ssh2
Jun 20 09:55:16 sip sshd[710927]: Invalid user ser from 51.254.38.106 port 40195
...
2020-06-20 16:50:08
60.250.244.210 attack
Invalid user lilian from 60.250.244.210 port 44630
2020-06-20 16:16:58
155.94.156.84 attackbotsspam
firewall-block, port(s): 8179/tcp
2020-06-20 16:38:23
92.50.249.166 attack
Jun 20 09:41:40 gestao sshd[22139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166 
Jun 20 09:41:41 gestao sshd[22139]: Failed password for invalid user maestro from 92.50.249.166 port 36586 ssh2
Jun 20 09:45:03 gestao sshd[22228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.50.249.166 
...
2020-06-20 16:55:48
154.117.126.249 attackbotsspam
Invalid user redmine from 154.117.126.249 port 55570
2020-06-20 16:43:52
117.215.46.254 attackspam
1592624984 - 06/20/2020 05:49:44 Host: 117.215.46.254/117.215.46.254 Port: 445 TCP Blocked
2020-06-20 16:57:51
60.206.36.141 attackbotsspam
Jun 20 09:18:58 hell sshd[13917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.206.36.141
Jun 20 09:19:00 hell sshd[13917]: Failed password for invalid user eka from 60.206.36.141 port 33342 ssh2
...
2020-06-20 16:32:51

Recently Reported IPs

23.155.11.75 201.7.192.123 22.141.196.136 34.249.115.52
66.196.248.195 87.71.2.215 35.245.190.59 171.143.2.14
91.121.173.58 71.202.255.63 45.32.230.208 200.82.146.213
124.217.235.145 38.13.218.198 96.62.119.11 193.1.230.15
188.166.235.192 94.197.21.207 133.66.100.71 229.189.179.101