Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oslo

Region: Oslo

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.204.121.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29335
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;195.204.121.1.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100100 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 01 21:22:19 CST 2020
;; MSG SIZE  rcvd: 117
Host info
1.121.204.195.in-addr.arpa domain name pointer fw.netwerk.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.121.204.195.in-addr.arpa	name = fw.netwerk.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.230.155 attackbotsspam
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-05-26 19:53:03
106.75.166.173 attackspam
Failed password for invalid user prideaux from 106.75.166.173 port 50300 ssh2
2020-05-26 20:00:28
138.68.75.113 attackspam
May 26 12:25:20 prox sshd[18791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.75.113 
May 26 12:25:22 prox sshd[18791]: Failed password for invalid user poll from 138.68.75.113 port 44456 ssh2
2020-05-26 19:57:25
42.116.172.77 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 19:27:26
68.183.84.28 attackspambots
REQUESTED PAGE: /wp-login.php
2020-05-26 19:39:42
177.0.108.210 attackspambots
May 26 05:02:15 server1 sshd\[29088\]: Invalid user test from 177.0.108.210
May 26 05:02:15 server1 sshd\[29088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.0.108.210 
May 26 05:02:17 server1 sshd\[29088\]: Failed password for invalid user test from 177.0.108.210 port 53478 ssh2
May 26 05:10:34 server1 sshd\[31706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.0.108.210  user=root
May 26 05:10:35 server1 sshd\[31706\]: Failed password for root from 177.0.108.210 port 58742 ssh2
...
2020-05-26 19:32:54
115.231.220.43 attack
SMB Server BruteForce Attack
2020-05-26 19:31:24
185.184.79.44 attackbots
Trying ports that it shouldn't be.
2020-05-26 20:10:27
49.248.108.28 attack
Unauthorized connection attempt from IP address 49.248.108.28 on Port 445(SMB)
2020-05-26 19:41:09
157.230.231.39 attack
May 26 10:21:32 ws26vmsma01 sshd[172514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.231.39
May 26 10:21:34 ws26vmsma01 sshd[172514]: Failed password for invalid user nyanga from 157.230.231.39 port 55766 ssh2
...
2020-05-26 20:08:24
129.146.104.226 attack
ICMP MH Probe, Scan /Distributed -
2020-05-26 20:02:52
122.169.16.52 attack
Unauthorized connection attempt from IP address 122.169.16.52 on Port 445(SMB)
2020-05-26 19:35:01
14.231.146.197 attack
Unauthorized connection attempt from IP address 14.231.146.197 on Port 445(SMB)
2020-05-26 19:51:54
185.234.219.205 attackspam
port scan and connect, tcp 80 (http)
2020-05-26 19:55:51
112.217.207.130 attackspambots
(sshd) Failed SSH login from 112.217.207.130 (KR/South Korea/-): 5 in the last 3600 secs
2020-05-26 19:40:48

Recently Reported IPs

202.86.196.180 223.93.106.124 109.232.53.180 221.144.60.125
77.29.122.250 129.206.243.80 212.18.203.4 97.97.162.250
208.148.241.119 117.173.252.44 218.210.18.229 117.161.13.69
74.209.26.201 167.137.109.60 73.135.29.154 198.236.14.249
101.35.74.103 207.192.232.207 1.173.132.211 118.109.25.221