Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.157.21.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.157.21.123.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:26:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 123.21.157.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.21.157.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.95.14.92 attack
Unauthorized connection attempt from IP address 59.95.14.92 on Port 445(SMB)
2020-08-01 02:24:26
51.144.3.140 attack
(mod_security) mod_security (id:20000005) triggered by 51.144.3.140 (NL/Netherlands/-): 5 in the last 300 secs
2020-08-01 02:19:28
117.69.155.51 attackbotsspam
Jul 31 16:19:20 srv01 postfix/smtpd\[2954\]: warning: unknown\[117.69.155.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 31 16:19:32 srv01 postfix/smtpd\[2954\]: warning: unknown\[117.69.155.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 31 16:19:49 srv01 postfix/smtpd\[2954\]: warning: unknown\[117.69.155.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 31 16:20:07 srv01 postfix/smtpd\[2954\]: warning: unknown\[117.69.155.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 31 16:20:19 srv01 postfix/smtpd\[2954\]: warning: unknown\[117.69.155.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-01 02:37:47
117.221.55.28 attack
Unauthorized connection attempt from IP address 117.221.55.28 on Port 445(SMB)
2020-08-01 02:31:47
192.35.168.149 attack
trying to access non-authorized port
2020-08-01 02:07:28
2.138.62.79 attack
Jul 31 13:51:44 marvibiene sshd[13240]: Failed password for root from 2.138.62.79 port 50782 ssh2
Jul 31 13:57:03 marvibiene sshd[13453]: Failed password for root from 2.138.62.79 port 59279 ssh2
2020-08-01 02:43:21
186.113.18.109 attackspambots
" "
2020-08-01 02:40:33
140.207.81.233 attackbotsspam
2020-07-31T16:23:24+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-01 02:10:26
147.135.169.185 attackbotsspam
Lines containing failures of 147.135.169.185
Jul 31 18:05:36 neon sshd[43192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.169.185  user=r.r
Jul 31 18:05:38 neon sshd[43192]: Failed password for r.r from 147.135.169.185 port 49808 ssh2
Jul 31 18:05:40 neon sshd[43192]: Received disconnect from 147.135.169.185 port 49808:11: Bye Bye [preauth]
Jul 31 18:05:40 neon sshd[43192]: Disconnected from authenticating user r.r 147.135.169.185 port 49808 [preauth]
Jul 31 18:15:59 neon sshd[46265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.169.185  user=r.r
Jul 31 18:16:01 neon sshd[46265]: Failed password for r.r from 147.135.169.185 port 38186 ssh2
Jul 31 18:16:05 neon sshd[46265]: Received disconnect from 147.135.169.185 port 38186:11: Bye Bye [preauth]
Jul 31 18:16:05 neon sshd[46265]: Disconnected from authenticating user r.r 147.135.169.185 port 38186 [preauth]
Jul 31 18:21........
------------------------------
2020-08-01 02:16:21
80.82.65.74 attackspam
 TCP (SYN) 80.82.65.74:42537 -> port 2002, len 44
2020-08-01 02:06:48
124.232.133.205 attackbotsspam
Jul 31 11:58:34 rush sshd[9118]: Failed password for root from 124.232.133.205 port 4611 ssh2
Jul 31 12:00:29 rush sshd[9144]: Failed password for root from 124.232.133.205 port 14356 ssh2
...
2020-08-01 02:40:47
103.233.114.109 attackspam
WordPress XMLRPC scan :: 103.233.114.109 0.220 BYPASS [31/Jul/2020:12:03:03  0000] [censored_2] "POST /xmlrpc.php HTTP/1.1" 200 415 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
2020-08-01 02:14:26
183.134.91.158 attackbots
SSH Brute Force
2020-08-01 02:20:47
202.38.182.40 attackbotsspam
Unauthorized connection attempt from IP address 202.38.182.40 on Port 445(SMB)
2020-08-01 02:41:26
27.128.168.225 attack
2020-07-31T19:40:13.532833galaxy.wi.uni-potsdam.de sshd[4123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.225  user=root
2020-07-31T19:40:15.089544galaxy.wi.uni-potsdam.de sshd[4123]: Failed password for root from 27.128.168.225 port 35365 ssh2
2020-07-31T19:41:13.503140galaxy.wi.uni-potsdam.de sshd[4201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.225  user=root
2020-07-31T19:41:15.295891galaxy.wi.uni-potsdam.de sshd[4201]: Failed password for root from 27.128.168.225 port 40293 ssh2
2020-07-31T19:42:15.716618galaxy.wi.uni-potsdam.de sshd[4383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.225  user=root
2020-07-31T19:42:18.021137galaxy.wi.uni-potsdam.de sshd[4383]: Failed password for root from 27.128.168.225 port 45220 ssh2
2020-07-31T19:43:25.422177galaxy.wi.uni-potsdam.de sshd[4661]: pam_unix(sshd:auth): authenticatio
...
2020-08-01 02:32:04

Recently Reported IPs

248.63.21.182 98.19.7.97 60.34.95.154 222.81.185.160
92.254.250.184 75.172.248.216 186.49.59.87 134.126.255.219
240.127.250.1 78.192.76.184 176.172.69.80 167.1.102.89
63.7.139.161 200.155.45.248 166.91.3.121 57.241.34.216
221.135.31.100 30.86.231.172 118.207.224.115 67.79.146.68