Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.4.2.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.4.2.121.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 07:38:47 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 121.2.4.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.2.4.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.87.72.14 attack
Attack RDP
2020-10-23 00:52:06
58.187.209.154 attack
hacker
2020-10-19 23:56:01
113.166.71.237 proxy
Cvzxbnyhnnnn   cfd
2020-10-28 00:35:39
185.63.253.205 proxynormal
Bokep jepang
2020-10-25 01:16:34
52.34.165.154 bots
Arriving at my site to scan it without identifying itself.
2020-10-31 18:16:29
11.90.150.204 spamattack
Nice
2020-10-29 01:54:34
81.29.100.14 spambotsattackproxynormal
11111111111
2020-10-22 19:41:53
194.61.55.160 spamattack
Icarus honeypot on github
2020-10-20 16:23:33
164.132.101.10 attack
ssh attack using dictionary of usernames
2020-10-23 23:17:30
151.236.35.245 attack
Attacked Synology DSM
2020-11-02 17:44:09
193.27.229.192 attack
brute force attack port scans
2020-10-29 12:57:46
139.162.247.102 attack
OSSEC HIDS Notification.
2020 Oct 15 19:14:19

Received From: shared->/var/log/secure
Rule: 1002 fired (level 2) -> "Unknown problem somewhere in the system."
Portion of the log(s):

Oct 15 19:14:18 shared sshd[2970433]: ssh_dispatch_run_fatal: Connection from 139.162.247.102 port 41166: bignum is negative [preauth]

 --END OF NOTIFICATION
2020-10-20 08:52:36
151.236.35.245 attack
synology login attempt
2020-11-01 03:08:33
151.236.35.245 attack
Hack attack on Synology server.
2020-11-01 03:16:34
185.63.253.200 spambotsattackproxynormal
Ysuhe
2020-10-21 15:16:02

Recently Reported IPs

124.40.104.103 217.48.2.10 245.0.14.70 72.194.151.126
245.67.5.0 0.18.146.17 0.18.90.50 228.4.241.33
35.85.202.56 19.141.234.175 1.13.111.10 1.13.106.141
52.144.108.31 47.244.88.162 167.102.157.89 192.177.188.165
196.27.0.68 207.69.143.87 196.40.0.20 37.47.94.104