Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.53.102.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.53.102.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:31:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.102.53.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.102.53.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.72.14.226 attackbotsspam
Unauthorized connection attempt from IP address 200.72.14.226 on Port 445(SMB)
2020-07-29 02:43:36
5.147.29.21 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-07-29 03:12:37
116.206.196.227 attackbots
xmlrpc attack
2020-07-29 02:54:54
201.131.93.182 attackspambots
Unauthorized connection attempt from IP address 201.131.93.182 on Port 445(SMB)
2020-07-29 02:55:19
67.170.68.104 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-07-29 03:03:56
118.101.192.62 attackspam
2020-07-28T20:05:12.972546v22018076590370373 sshd[977]: Invalid user github from 118.101.192.62 port 36365
2020-07-28T20:05:12.977907v22018076590370373 sshd[977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.62
2020-07-28T20:05:12.972546v22018076590370373 sshd[977]: Invalid user github from 118.101.192.62 port 36365
2020-07-28T20:05:15.344999v22018076590370373 sshd[977]: Failed password for invalid user github from 118.101.192.62 port 36365 ssh2
2020-07-28T20:09:35.284317v22018076590370373 sshd[13195]: Invalid user jianzuoyi from 118.101.192.62 port 41951
...
2020-07-29 03:07:25
129.211.65.70 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-29 03:05:41
162.243.215.241 attackbots
$f2bV_matches
2020-07-29 03:04:27
79.123.249.87 attackbots
1595947574 - 07/28/2020 16:46:14 Host: 79.123.249.87/79.123.249.87 Port: 445 TCP Blocked
2020-07-29 02:53:30
91.251.166.20 attack
91.251.166.20 (IR/Iran/-), more than 60 Apache 403 hits in the last 3600 secs; Ports: 80,443; Direction: in; Trigger: LF_APACHE_403; Logs:
2020-07-29 03:21:25
173.196.16.227 attackspam
SSH/22 MH Probe, BF, Hack -
2020-07-29 03:13:20
103.89.176.73 attackbotsspam
Jul 28 22:32:07 lunarastro sshd[13898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.73 
Jul 28 22:32:09 lunarastro sshd[13898]: Failed password for invalid user yxding from 103.89.176.73 port 38580 ssh2
2020-07-29 02:53:10
190.146.184.215 attack
Total attacks: 2
2020-07-29 03:26:24
52.224.233.188 attack
2020/07/28 17:59:23 [error] 23048#23048: *39196 FastCGI sent in stderr: "Primary script unknown" while reading response header from upstream, client: 52.224.233.188, server: , request: "GET /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/run/php-fpm/php-fdf1d4a0-1ee6-4ddf-8a4a-bf7184d3fc60.sock:", host: "rakkor.uk"
2020-07-29 02:45:25
153.37.98.243 attackspambots
Jul 28 20:09:17 fhem-rasp sshd[7535]: Invalid user jinjiayu from 153.37.98.243 port 53724
...
2020-07-29 03:22:06

Recently Reported IPs

200.58.247.148 246.9.57.125 81.254.74.207 217.73.76.189
213.126.59.185 150.200.118.177 245.197.32.63 82.170.155.168
193.181.218.45 14.39.18.29 5.7.47.47 226.94.163.89
207.117.175.84 30.242.21.136 156.150.165.81 138.170.241.218
243.45.88.105 181.188.149.198 213.244.52.113 214.36.101.209