Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.121.196.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.121.196.142.		IN	A

;; AUTHORITY SECTION:
.			465	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 15:38:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.196.121.182.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.196.121.182.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.53.109.140 attack
2020-03-23T12:07:21.849528jannga.de sshd[28836]: Invalid user oracle from 187.53.109.140 port 55334
2020-03-23T12:07:24.075368jannga.de sshd[28836]: Failed password for invalid user oracle from 187.53.109.140 port 55334 ssh2
...
2020-03-23 19:53:20
27.218.17.107 attackspambots
23/tcp
[2020-03-23]1pkt
2020-03-23 19:42:21
2a01:4f8:c17:41a9::1 attack
xmlrpc attack
2020-03-23 19:36:22
119.155.40.192 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-23 20:15:28
139.99.125.22 attackspam
3320/tcp
[2020-03-23]1pkt
2020-03-23 20:06:07
101.91.178.122 attackspambots
SSH bruteforce
2020-03-23 19:44:22
91.189.234.122 attackspambots
[Mon Mar 02 18:05:12 2020] - Syn Flood From IP: 91.189.234.122 Port: 6000
2020-03-23 19:33:01
27.156.125.22 attack
Mar 23 10:23:51 vps339862 kernel: \[4174347.141390\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58890 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT \(020405AC0402080A4D9E7E110000000001030307\) 
Mar 23 10:23:52 vps339862 kernel: \[4174348.158480\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58891 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT \(020405AC0402080A4D9E82090000000001030307\) 
Mar 23 10:23:54 vps339862 kernel: \[4174350.173289\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58892 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SY
...
2020-03-23 19:33:16
220.133.12.188 attack
Honeypot attack, port: 81, PTR: 220-133-12-188.HINET-IP.hinet.net.
2020-03-23 20:02:34
213.137.236.118 attack
Unauthorized connection attempt from IP address 213.137.236.118 on Port 445(SMB)
2020-03-23 19:49:28
45.122.221.210 attackbots
(sshd) Failed SSH login from 45.122.221.210 (VN/Vietnam/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 12:33:46 ubnt-55d23 sshd[29793]: Invalid user tl from 45.122.221.210 port 45948
Mar 23 12:33:48 ubnt-55d23 sshd[29793]: Failed password for invalid user tl from 45.122.221.210 port 45948 ssh2
2020-03-23 19:45:17
94.137.137.196 attackspam
Mar 23 13:01:23 sd-53420 sshd\[18949\]: Invalid user nbkondoh from 94.137.137.196
Mar 23 13:01:23 sd-53420 sshd\[18949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.137.137.196
Mar 23 13:01:25 sd-53420 sshd\[18949\]: Failed password for invalid user nbkondoh from 94.137.137.196 port 48648 ssh2
Mar 23 13:05:15 sd-53420 sshd\[20304\]: Invalid user mapred from 94.137.137.196
Mar 23 13:05:15 sd-53420 sshd\[20304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.137.137.196
...
2020-03-23 20:08:42
113.110.230.126 attackbots
$f2bV_matches
2020-03-23 19:40:33
111.175.186.150 attack
Mar 23 08:20:31 game-panel sshd[873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.175.186.150
Mar 23 08:20:33 game-panel sshd[873]: Failed password for invalid user cdr from 111.175.186.150 port 8991 ssh2
Mar 23 08:25:23 game-panel sshd[1056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.175.186.150
2020-03-23 20:04:25
115.59.69.84 attackspam
5353/udp
[2020-03-23]1pkt
2020-03-23 19:38:11

Recently Reported IPs

182.121.188.36 182.121.188.26 182.121.19.211 182.121.201.25
182.121.204.112 182.121.200.118 182.121.204.230 182.121.216.226
182.121.219.133 182.121.224.254 182.121.237.40 182.121.254.199
182.121.234.244 182.121.63.97 182.121.46.254 182.121.235.243
182.121.62.85 182.121.37.53 182.121.82.15 182.121.82.121