Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.21.132.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.21.132.147.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 07:10:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
147.132.21.100.in-addr.arpa domain name pointer ec2-100-21-132-147.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.132.21.100.in-addr.arpa	name = ec2-100-21-132-147.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.109.200.107 attack
Nov 12 19:11:23 sachi sshd\[13164\]: Invalid user ubnt from 219.109.200.107
Nov 12 19:11:23 sachi sshd\[13164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tcn010107.tcn-catv.ne.jp
Nov 12 19:11:26 sachi sshd\[13164\]: Failed password for invalid user ubnt from 219.109.200.107 port 42804 ssh2
Nov 12 19:15:28 sachi sshd\[13503\]: Invalid user marv from 219.109.200.107
Nov 12 19:15:28 sachi sshd\[13503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tcn010107.tcn-catv.ne.jp
2019-11-13 13:32:00
193.70.2.117 attack
2019-11-13T05:32:46.925966abusebot-5.cloudsearch.cf sshd\[22263\]: Invalid user tester from 193.70.2.117 port 58170
2019-11-13 13:52:13
128.199.100.225 attackspambots
2019-11-13T05:35:43.767192abusebot-6.cloudsearch.cf sshd\[25681\]: Invalid user cristian from 128.199.100.225 port 50056
2019-11-13 13:50:32
106.13.199.71 attackspambots
2019-11-13T05:33:02.259248  sshd[1577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.71  user=root
2019-11-13T05:33:03.655285  sshd[1577]: Failed password for root from 106.13.199.71 port 53598 ssh2
2019-11-13T05:58:46.464956  sshd[1865]: Invalid user osvaldo from 106.13.199.71 port 43660
2019-11-13T05:58:46.480041  sshd[1865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.199.71
2019-11-13T05:58:46.464956  sshd[1865]: Invalid user osvaldo from 106.13.199.71 port 43660
2019-11-13T05:58:48.172309  sshd[1865]: Failed password for invalid user osvaldo from 106.13.199.71 port 43660 ssh2
...
2019-11-13 13:31:27
222.186.173.215 attackbots
2019-11-13T06:06:07.1903631240 sshd\[2916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
2019-11-13T06:06:09.0925411240 sshd\[2916\]: Failed password for root from 222.186.173.215 port 33594 ssh2
2019-11-13T06:06:11.9799081240 sshd\[2916\]: Failed password for root from 222.186.173.215 port 33594 ssh2
...
2019-11-13 13:17:33
222.186.180.41 attack
SSH Brute Force, server-1 sshd[17374]: Failed password for root from 222.186.180.41 port 3318 ssh2
2019-11-13 13:14:59
94.176.17.27 attackbotsspam
(Nov 13)  LEN=60 TTL=116 ID=26149 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 13)  LEN=60 TTL=114 ID=13322 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 13)  LEN=60 TTL=114 ID=1622 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=114 ID=1232 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=1555 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=4515 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=114 ID=12754 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 12)  LEN=60 TTL=116 ID=16085 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=115 ID=25282 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=115 ID=20399 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 11)  LEN=60 TTL=113 ID=24666 DF TCP DPT=1433 WINDOW=8192 SYN
2019-11-13 13:35:27
121.13.131.165 attackspambots
Connection by 121.13.131.165 on port: 139 got caught by honeypot at 11/13/2019 3:59:04 AM
2019-11-13 13:20:33
172.69.34.153 attack
172.69.34.153 - - [13/Nov/2019:04:58:01 +0000] "POST /wp-login.php HTTP/1.1" 200 1449 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-13 13:56:30
177.158.37.151 attackbots
Unauthorised access (Nov 13) SRC=177.158.37.151 LEN=52 TOS=0x10 PREC=0x40 TTL=112 ID=25629 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-13 13:25:19
49.206.6.184 attackspambots
Unauthorised access (Nov 13) SRC=49.206.6.184 LEN=52 PREC=0x20 TTL=114 ID=13280 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-13 13:36:48
129.28.57.8 attackbotsspam
2019-11-13T05:30:50.059333abusebot-7.cloudsearch.cf sshd\[27089\]: Invalid user marcelo from 129.28.57.8 port 43921
2019-11-13 13:53:26
50.127.71.5 attack
$f2bV_matches
2019-11-13 13:51:55
198.108.67.91 attack
firewall-block, port(s): 8856/tcp
2019-11-13 13:33:52
45.144.3.155 attackbots
Nov 13 06:23:04 kmh-mb-001 sshd[7340]: Bad protocol version identification '' from 45.144.3.155 port 35270
Nov 13 06:23:19 kmh-mb-001 sshd[7341]: Did not receive identification string from 45.144.3.155 port 35622
Nov 13 06:23:20 kmh-mb-001 sshd[7342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7342]: Failed password for r.r from 45.144.3.155 port 35624 ssh2
Nov 13 06:23:21 kmh-mb-001 sshd[7342]: Connection closed by 45.144.3.155 port 35624 [preauth]
Nov 13 06:23:21 kmh-mb-001 sshd[7344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.144.3.155  user=r.r
Nov 13 06:23:21 kmh-mb-001 sshd[7346]: Connection closed by 45.144.3.155 port 35758 [preauth]
Nov 13 06:23:23 kmh-mb-001 sshd[73........
-------------------------------
2019-11-13 13:38:35

Recently Reported IPs

100.21.127.213 100.21.144.6 100.21.181.166 100.21.243.8
100.24.170.69 100.24.191.79 228.199.186.30 145.237.210.177
100.26.245.247 100.26.32.103 5.37.68.37 101.0.65.174
101.0.71.190 101.0.77.15 101.0.77.170 101.0.77.66
101.0.78.134 101.0.78.36 101.0.80.178 101.0.80.26