Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.121.136.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.121.136.207.			IN	A

;; AUTHORITY SECTION:
.			434	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:10:55 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 207.136.121.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.136.121.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.2.122.205 attackspam
Unauthorized connection attempt from IP address 117.2.122.205 on Port 445(SMB)
2019-11-04 04:36:58
103.218.241.106 attackbotsspam
Nov  3 19:58:44 hcbbdb sshd\[24623\]: Invalid user 123@hetzner1 from 103.218.241.106
Nov  3 19:58:44 hcbbdb sshd\[24623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.106
Nov  3 19:58:47 hcbbdb sshd\[24623\]: Failed password for invalid user 123@hetzner1 from 103.218.241.106 port 56426 ssh2
Nov  3 20:02:50 hcbbdb sshd\[25026\]: Invalid user changeme from 103.218.241.106
Nov  3 20:02:50 hcbbdb sshd\[25026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.218.241.106
2019-11-04 04:08:16
120.138.8.85 attack
Unauthorized connection attempt from IP address 120.138.8.85 on Port 445(SMB)
2019-11-04 04:38:56
201.20.42.129 attackspambots
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-11-04 04:08:32
199.195.252.213 attack
2019-11-03T15:54:09.875804abusebot-5.cloudsearch.cf sshd\[4651\]: Invalid user test from 199.195.252.213 port 51658
2019-11-04 04:25:39
197.50.148.104 attack
Unauthorized connection attempt from IP address 197.50.148.104 on Port 445(SMB)
2019-11-04 04:09:42
198.50.201.49 attackbots
(From ryanc@pjnmail.com) I came across your website and just wanted to reach
out to see if you're hiring? 

If so, I'd like to extend an offer to post to top job sites like
ZipRecruiter, Glassdoor, TopUSAJobs, and more at no cost
for two weeks. 

Here are some of the key benefits: 

-- Post to top job sites with one click 
-- Manage all candidates in one place 
-- No cost for two weeks 

You can post your job openings now by going to our website below: 

>> TryProJob [dot] com 

* Please use offer code 987FREE -- Expires Soon * 

Thanks for your time, 
Ryan C. 

ProJobNetwork 
10451 Twin Rivers Rd #279 
Columbia, MD 21044 

To OPT OUT, please email ryanc@pjnmail.com with "REMOVE sigafoosejackson.com" in the subject line.
2019-11-04 04:28:27
51.77.200.62 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-11-04 04:21:09
110.164.77.42 attackspambots
Unauthorized connection attempt from IP address 110.164.77.42 on Port 445(SMB)
2019-11-04 04:35:52
147.50.3.30 attack
Nov  3 11:40:44 TORMINT sshd\[5606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.3.30  user=root
Nov  3 11:40:46 TORMINT sshd\[5606\]: Failed password for root from 147.50.3.30 port 29316 ssh2
Nov  3 11:46:15 TORMINT sshd\[5820\]: Invalid user yasuda from 147.50.3.30
Nov  3 11:46:15 TORMINT sshd\[5820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.3.30
...
2019-11-04 04:37:38
45.55.177.230 attack
2019-11-03T16:35:12.579112shield sshd\[15680\]: Invalid user houting from 45.55.177.230 port 38232
2019-11-03T16:35:12.583699shield sshd\[15680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.230
2019-11-03T16:35:14.948207shield sshd\[15680\]: Failed password for invalid user houting from 45.55.177.230 port 38232 ssh2
2019-11-03T16:39:37.227035shield sshd\[17574\]: Invalid user grouchy from 45.55.177.230 port 57410
2019-11-03T16:39:37.231326shield sshd\[17574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.230
2019-11-04 04:39:54
106.13.13.152 attackbotsspam
5x Failed Password
2019-11-04 04:06:20
51.79.53.38 attack
Nov  3 17:48:15 markkoudstaal sshd[26071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.53.38
Nov  3 17:48:17 markkoudstaal sshd[26071]: Failed password for invalid user qazwsx from 51.79.53.38 port 43160 ssh2
Nov  3 17:52:21 markkoudstaal sshd[26451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.53.38
2019-11-04 04:16:48
74.208.47.8 attackspambots
74.208.47.8 - - \[03/Nov/2019:18:29:10 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
74.208.47.8 - - \[03/Nov/2019:18:29:10 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-04 04:39:30
112.85.42.173 attack
Nov  3 10:11:55 TORMINT sshd\[619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Nov  3 10:11:57 TORMINT sshd\[619\]: Failed password for root from 112.85.42.173 port 49775 ssh2
Nov  3 10:12:18 TORMINT sshd\[634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
...
2019-11-04 04:14:25

Recently Reported IPs

16.45.146.23 200.63.106.26 242.27.235.114 115.163.202.196
54.29.42.166 92.133.3.20 31.160.219.241 19.222.185.94
146.42.106.104 41.204.86.151 31.0.32.79 65.205.231.170
125.204.177.169 111.141.66.249 218.216.245.133 214.93.43.184
81.214.5.125 120.117.228.20 61.142.215.136 30.243.197.103