Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daegu

Region: Daegu Metropolitan City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.121.80.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.121.80.102.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102701 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 28 04:28:59 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 102.80.121.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 102.80.121.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.228.182.244 attack
Jul 28 01:27:54 giegler sshd[15763]: Invalid user !qa from 94.228.182.244 port 40202
Jul 28 01:27:54 giegler sshd[15763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.228.182.244
Jul 28 01:27:54 giegler sshd[15763]: Invalid user !qa from 94.228.182.244 port 40202
Jul 28 01:27:56 giegler sshd[15763]: Failed password for invalid user !qa from 94.228.182.244 port 40202 ssh2
2019-07-28 07:30:57
3.1.60.162 attackspam
Invalid user arun from 3.1.60.162 port 57086
2019-07-28 07:18:02
202.84.45.250 attackbots
Invalid user student from 202.84.45.250 port 42593
2019-07-28 07:19:02
115.254.63.52 attackspambots
Invalid user applmgr from 115.254.63.52 port 36451
2019-07-28 07:09:57
185.220.100.253 attack
Fail2Ban Ban Triggered
2019-07-28 07:22:28
2.50.42.85 attackspam
Invalid user user1 from 2.50.42.85 port 53557
2019-07-28 07:34:32
138.99.133.130 attackspam
Invalid user oscar from 138.99.133.130 port 8050
2019-07-28 07:37:51
128.199.123.60 attackbots
Jul 28 00:27:45 [munged] sshd[31122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.60  user=root
Jul 28 00:27:47 [munged] sshd[31122]: Failed password for root from 128.199.123.60 port 56942 ssh2
2019-07-28 07:28:19
60.53.10.53 attack
Invalid user usuario from 60.53.10.53 port 53939
2019-07-28 07:15:28
217.182.205.162 attack
Invalid user abc from 217.182.205.162 port 52907
2019-07-28 06:54:34
167.99.138.153 attack
Jul 27 18:15:00 plusreed sshd[7621]: Invalid user edong!@#g from 167.99.138.153
...
2019-07-28 06:59:52
187.65.240.24 attack
Invalid user esther from 187.65.240.24 port 30221
2019-07-28 07:21:28
88.16.141.127 attackspambots
Invalid user cron from 88.16.141.127 port 60200
2019-07-28 07:32:03
187.112.251.65 attackbots
Invalid user user from 187.112.251.65 port 50763
2019-07-28 07:21:05
165.227.151.59 attackspambots
Invalid user user from 165.227.151.59 port 39784
2019-07-28 07:00:16

Recently Reported IPs

7.97.207.41 205.12.89.178 152.247.239.32 180.68.24.118
63.10.222.147 23.212.97.159 112.13.112.116 23.179.67.116
96.12.251.20 225.118.9.169 225.118.11.236 64.167.132.125
122.5.77.40 21.90.103.156 212.28.13.0 85.25.27.213
160.107.130.119 116.26.170.88 240.244.171.185 195.148.184.14