Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.135.121.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.135.121.21.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:19:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 21.121.135.192.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 192.135.121.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
41.208.150.114 attack
Aug 31 03:08:49 game-panel sshd[16995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114
Aug 31 03:08:51 game-panel sshd[16995]: Failed password for invalid user teamspeak from 41.208.150.114 port 52666 ssh2
Aug 31 03:13:29 game-panel sshd[17290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.208.150.114
2019-08-31 11:26:38
82.166.160.4 attack
Unauthorised access (Aug 31) SRC=82.166.160.4 LEN=40 TTL=245 ID=36915 TCP DPT=445 WINDOW=1024 SYN
2019-08-31 12:08:15
54.37.17.251 attackspambots
Aug 31 05:22:09 vps691689 sshd[10744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.17.251
Aug 31 05:22:11 vps691689 sshd[10744]: Failed password for invalid user temp from 54.37.17.251 port 60682 ssh2
...
2019-08-31 11:29:32
35.231.6.102 attack
Aug 31 02:54:43 game-panel sshd[16319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.6.102
Aug 31 02:54:45 game-panel sshd[16319]: Failed password for invalid user tir from 35.231.6.102 port 35198 ssh2
Aug 31 02:58:59 game-panel sshd[16530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.6.102
2019-08-31 11:29:52
60.248.28.105 attackbots
Aug 31 05:28:20 lnxmysql61 sshd[590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.248.28.105
2019-08-31 11:38:49
159.65.158.63 attackbots
Jul  6 23:41:27 vtv3 sshd\[7312\]: Invalid user wayne from 159.65.158.63 port 52776
Jul  6 23:41:27 vtv3 sshd\[7312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.63
Jul  6 23:41:29 vtv3 sshd\[7312\]: Failed password for invalid user wayne from 159.65.158.63 port 52776 ssh2
Jul  6 23:46:02 vtv3 sshd\[9491\]: Invalid user willy from 159.65.158.63 port 37986
Jul  6 23:46:02 vtv3 sshd\[9491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.63
Jul  6 23:57:57 vtv3 sshd\[14984\]: Invalid user phoenix from 159.65.158.63 port 54504
Jul  6 23:57:57 vtv3 sshd\[14984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.63
Jul  6 23:57:59 vtv3 sshd\[14984\]: Failed password for invalid user phoenix from 159.65.158.63 port 54504 ssh2
Jul  7 00:00:57 vtv3 sshd\[16608\]: Invalid user nico from 159.65.158.63 port 51574
Jul  7 00:00:57 vtv3 sshd\[16608\]: pam_uni
2019-08-31 12:02:33
128.199.108.108 attackbots
Aug 31 03:16:24 vtv3 sshd\[13899\]: Invalid user ftpguest from 128.199.108.108 port 57264
Aug 31 03:16:24 vtv3 sshd\[13899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.108.108
Aug 31 03:16:26 vtv3 sshd\[13899\]: Failed password for invalid user ftpguest from 128.199.108.108 port 57264 ssh2
Aug 31 03:23:18 vtv3 sshd\[17231\]: Invalid user db2das1 from 128.199.108.108 port 36542
Aug 31 03:23:18 vtv3 sshd\[17231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.108.108
Aug 31 03:37:02 vtv3 sshd\[24507\]: Invalid user jwinne from 128.199.108.108 port 58962
Aug 31 03:37:02 vtv3 sshd\[24507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.108.108
Aug 31 03:37:05 vtv3 sshd\[24507\]: Failed password for invalid user jwinne from 128.199.108.108 port 58962 ssh2
Aug 31 03:41:40 vtv3 sshd\[26936\]: Invalid user rolo from 128.199.108.108 port 47606
Aug 31 03:41:4
2019-08-31 11:45:50
38.103.128.12 attack
Aug 31 06:48:34 taivassalofi sshd[2072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.103.128.12
Aug 31 06:48:37 taivassalofi sshd[2072]: Failed password for invalid user amanas from 38.103.128.12 port 39008 ssh2
...
2019-08-31 11:51:34
79.120.221.66 attackbots
Aug 31 05:09:00 legacy sshd[4826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.221.66
Aug 31 05:09:02 legacy sshd[4826]: Failed password for invalid user csadmin from 79.120.221.66 port 36958 ssh2
Aug 31 05:17:29 legacy sshd[4969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.221.66
...
2019-08-31 11:40:23
104.248.120.196 attackbotsspam
Aug 31 05:55:37 meumeu sshd[7680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.120.196 
Aug 31 05:55:39 meumeu sshd[7680]: Failed password for invalid user django from 104.248.120.196 port 51974 ssh2
Aug 31 05:59:43 meumeu sshd[8115]: Failed password for root from 104.248.120.196 port 40448 ssh2
...
2019-08-31 12:08:34
137.74.119.50 attackspam
Aug 31 05:14:04 plex sshd[30763]: Invalid user mahern from 137.74.119.50 port 51424
2019-08-31 11:33:52
142.93.198.86 attack
Aug 31 05:46:45 nginx sshd[93331]: Connection from 142.93.198.86 port 56176 on 10.23.102.80 port 22
Aug 31 05:46:45 nginx sshd[93331]: Invalid user gl from 142.93.198.86
2019-08-31 11:57:38
71.202.216.185 attack
Aug 31 05:43:47 vps647732 sshd[27809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.202.216.185
Aug 31 05:43:49 vps647732 sshd[27809]: Failed password for invalid user john from 71.202.216.185 port 33768 ssh2
...
2019-08-31 11:51:13
186.64.114.220 attackbotsspam
WordPress wp-login brute force :: 186.64.114.220 0.128 BYPASS [31/Aug/2019:11:37:24  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-31 11:52:46
128.199.219.181 attackspam
Aug 30 17:24:00 hiderm sshd\[3354\]: Invalid user admin from 128.199.219.181
Aug 30 17:24:00 hiderm sshd\[3354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181
Aug 30 17:24:02 hiderm sshd\[3354\]: Failed password for invalid user admin from 128.199.219.181 port 43937 ssh2
Aug 30 17:28:47 hiderm sshd\[3734\]: Invalid user user0 from 128.199.219.181
Aug 30 17:28:47 hiderm sshd\[3734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181
2019-08-31 11:30:45

Recently Reported IPs

192.134.136.12 192.135.131.46 192.135.209.157 192.136.118.181
192.136.113.20 192.135.95.40 192.136.136.47 192.136.176.239
192.138.162.72 192.138.189.150 192.138.162.65 192.138.18.95
192.137.161.66 192.138.189.167 192.138.16.80 192.138.189.190
192.138.19.54 192.138.20.132 192.138.209.25 192.138.189.181