Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.45.21.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.45.21.119.			IN	A

;; AUTHORITY SECTION:
.			562	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 03:22:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 119.21.45.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.21.45.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.142.120.93 attack
Sep 30 07:42:35 mail postfix/smtpd\[6709\]: warning: unknown\[45.142.120.93\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 30 07:42:35 mail postfix/smtpd\[6710\]: warning: unknown\[45.142.120.93\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 30 08:12:43 mail postfix/smtpd\[7592\]: warning: unknown\[45.142.120.93\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 30 08:12:45 mail postfix/smtpd\[7611\]: warning: unknown\[45.142.120.93\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-30 14:55:57
62.76.229.231 attack
0,36-05/29 [bc05/m18] PostRequest-Spammer scoring: luanda
2020-09-30 15:25:07
27.213.115.223 attack
[Tue Sep 29 17:37:42.048404 2020] [:error] [pid 28911] [client 27.213.115.223:35261] [client 27.213.115.223] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 18)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "ws24vmsma01.ufn.edu.br"] [uri "/setup.cgi"] [unique_id "X3ObE9ZaOH@pgElFETkfmQAAAAU"]
...
2020-09-30 15:05:55
85.209.0.251 attack
<6 unauthorized SSH connections
2020-09-30 15:09:10
179.191.239.225 attack
1601411863 - 09/29/2020 22:37:43 Host: 179.191.239.225/179.191.239.225 Port: 445 TCP Blocked
2020-09-30 15:06:27
51.83.136.117 attackspam
Sep 29 19:18:06 ws22vmsma01 sshd[192332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.136.117
Sep 29 19:18:07 ws22vmsma01 sshd[192332]: Failed password for invalid user office1 from 51.83.136.117 port 41324 ssh2
...
2020-09-30 15:10:49
159.65.157.221 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-30 15:26:28
187.107.68.86 attackspam
$f2bV_matches
2020-09-30 15:07:29
120.194.194.86 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 15:35:29
106.12.117.75 attack
Port scan on 3 port(s): 2376 4244 5555
2020-09-30 14:51:18
185.49.87.86 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-30 15:33:21
191.239.249.47 attackbots
2020-09-29T20:34:22.300146dmca.cloudsearch.cf sshd[6451]: Invalid user info1 from 191.239.249.47 port 55806
2020-09-29T20:34:22.311392dmca.cloudsearch.cf sshd[6451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.239.249.47
2020-09-29T20:34:22.300146dmca.cloudsearch.cf sshd[6451]: Invalid user info1 from 191.239.249.47 port 55806
2020-09-29T20:34:24.245275dmca.cloudsearch.cf sshd[6451]: Failed password for invalid user info1 from 191.239.249.47 port 55806 ssh2
2020-09-29T20:37:59.100391dmca.cloudsearch.cf sshd[6606]: Invalid user hans from 191.239.249.47 port 54708
2020-09-29T20:37:59.105246dmca.cloudsearch.cf sshd[6606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.239.249.47
2020-09-29T20:37:59.100391dmca.cloudsearch.cf sshd[6606]: Invalid user hans from 191.239.249.47 port 54708
2020-09-29T20:38:00.828485dmca.cloudsearch.cf sshd[6606]: Failed password for invalid user hans from 191.239.249.47
...
2020-09-30 14:54:31
141.98.81.154 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T06:49:35Z
2020-09-30 15:35:04
108.190.31.236 attackspam
Automatic report - Banned IP Access
2020-09-30 14:59:09
115.134.128.90 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-09-30 15:11:48

Recently Reported IPs

112.64.155.59 67.90.203.192 119.125.148.204 175.17.114.146
210.212.178.183 187.83.129.28 53.17.245.241 179.58.155.81
185.58.86.81 164.15.224.166 58.19.182.86 122.251.186.107
234.214.71.47 23.47.28.46 45.69.56.111 141.217.52.76
218.185.207.202 248.203.170.232 126.231.205.123 42.167.96.145