Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Setagaya-ku

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.21.10.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.21.10.45.			IN	A

;; AUTHORITY SECTION:
.			199	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 08:44:23 CST 2022
;; MSG SIZE  rcvd: 103
Host info
45.10.21.1.in-addr.arpa domain name pointer sky3.skyserv.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.10.21.1.in-addr.arpa	name = sky3.skyserv.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
193.202.45.202 attackspambots
5080/udp 5060/udp...
[2020-04-13/05-03]50pkt,2pt.(udp)
2020-05-04 19:04:55
124.228.54.158 attackbotsspam
firewall-block, port(s): 23/tcp
2020-05-04 19:12:05
95.179.209.122 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 04/05/2020 04:50:32.
2020-05-04 18:50:50
14.244.100.29 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 04/05/2020 04:50:30.
2020-05-04 18:55:44
182.140.235.149 attackspambots
CN_APNIC-HM_<177>1588564234 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 182.140.235.149:51156
2020-05-04 18:48:24
117.4.115.62 attackspam
firewall-block, port(s): 445/tcp
2020-05-04 19:15:16
87.251.74.201 attackbotsspam
Port scan
2020-05-04 19:18:44
80.10.25.69 attackspam
firewall-block, port(s): 23/tcp
2020-05-04 19:21:54
54.37.165.17 attack
$f2bV_matches
2020-05-04 18:59:52
61.221.229.170 attackbotsspam
firewall-block, port(s): 81/tcp
2020-05-04 19:25:05
59.120.1.133 attackspam
Triggered by Fail2Ban at Ares web server
2020-05-04 19:17:40
51.15.60.138 attackspam
Connection by 51.15.60.138 on port: 81 got caught by honeypot at 5/4/2020 11:23:10 AM
2020-05-04 18:46:40
139.170.150.252 attack
May  4 06:22:26 ip-172-31-62-245 sshd\[327\]: Invalid user mos from 139.170.150.252\
May  4 06:22:29 ip-172-31-62-245 sshd\[327\]: Failed password for invalid user mos from 139.170.150.252 port 18646 ssh2\
May  4 06:24:09 ip-172-31-62-245 sshd\[357\]: Invalid user dealer from 139.170.150.252\
May  4 06:24:11 ip-172-31-62-245 sshd\[357\]: Failed password for invalid user dealer from 139.170.150.252 port 21098 ssh2\
May  4 06:25:01 ip-172-31-62-245 sshd\[366\]: Invalid user maria from 139.170.150.252\
2020-05-04 19:19:52
190.18.66.231 attack
DATE:2020-05-04 10:34:24, IP:190.18.66.231, PORT:3306 SQL brute force auth on honeypot MySQL/MariaDB server (honey-neo-dc)
2020-05-04 19:02:59
138.94.20.250 attackbots
Unauthorized connection attempt from IP address 138.94.20.250 on Port 445(SMB)
2020-05-04 18:54:26

Recently Reported IPs

1.21.10.35 1.214.152.218 1.215.247.132 129.167.23.12
1.217.246.178 1.217.55.97 1.22.231.87 1.220.114.154
1.226.250.38 1.32.247.250 1.36.245.175 1.4.198.206
1.4.229.233 182.171.247.221 1.4.247.171 1.4.249.169
1.4.251.223 1.47.142.3 1.49.196.237 1.54.14.99