Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.21.216.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.21.216.103.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:55:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 103.216.21.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.216.21.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.252.84.191 attackspambots
Automatic report - Banned IP Access
2019-10-30 23:39:09
148.70.26.85 attack
Automatic report - Banned IP Access
2019-10-31 00:26:05
101.51.217.62 attackbotsspam
445/tcp
[2019-10-30]1pkt
2019-10-30 23:55:29
203.114.102.69 attackspambots
Invalid user kq from 203.114.102.69 port 33812
2019-10-31 00:21:58
69.121.227.93 attackbots
60001/tcp
[2019-10-30]1pkt
2019-10-30 23:44:22
193.32.163.182 attack
Oct 30 16:53:35 MK-Soft-Root2 sshd[16141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 
Oct 30 16:53:37 MK-Soft-Root2 sshd[16141]: Failed password for invalid user admin from 193.32.163.182 port 55252 ssh2
...
2019-10-30 23:56:52
222.186.169.194 attackbotsspam
Oct 30 16:52:04 rotator sshd\[9417\]: Failed password for root from 222.186.169.194 port 40798 ssh2Oct 30 16:52:07 rotator sshd\[9417\]: Failed password for root from 222.186.169.194 port 40798 ssh2Oct 30 16:52:11 rotator sshd\[9417\]: Failed password for root from 222.186.169.194 port 40798 ssh2Oct 30 16:52:16 rotator sshd\[9417\]: Failed password for root from 222.186.169.194 port 40798 ssh2Oct 30 16:52:19 rotator sshd\[9417\]: Failed password for root from 222.186.169.194 port 40798 ssh2Oct 30 16:52:25 rotator sshd\[9422\]: Failed password for root from 222.186.169.194 port 52744 ssh2
...
2019-10-30 23:59:38
50.4.93.74 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/50.4.93.74/ 
 
 US - 1H : (236)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN12083 
 
 IP : 50.4.93.74 
 
 CIDR : 50.4.92.0/22 
 
 PREFIX COUNT : 944 
 
 UNIQUE IP COUNT : 1142272 
 
 
 ATTACKS DETECTED ASN12083 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-30 12:51:07 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-31 00:01:58
89.6.100.216 attackspam
Automatic report - Port Scan Attack
2019-10-30 23:55:55
5.78.210.230 attack
23/tcp
[2019-10-30]1pkt
2019-10-31 00:22:50
37.133.22.255 attackspambots
Oct 29 02:03:23 indra sshd[89961]: Invalid user pi from 37.133.22.255
Oct 29 02:03:24 indra sshd[89961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 
Oct 29 02:03:24 indra sshd[89963]: Invalid user pi from 37.133.22.255
Oct 29 02:03:24 indra sshd[89963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 
Oct 29 02:03:26 indra sshd[89961]: Failed password for invalid user pi from 37.133.22.255 port 32778 ssh2
Oct 29 02:03:26 indra sshd[89961]: Connection closed by 37.133.22.255 [preauth]
Oct 29 02:03:26 indra sshd[89963]: Failed password for invalid user pi from 37.133.22.255 port 32782 ssh2
Oct 29 02:03:26 indra sshd[89963]: Connection closed by 37.133.22.255 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.133.22.255
2019-10-31 00:10:59
220.144.39.98 attack
23/tcp
[2019-10-30]1pkt
2019-10-31 00:10:24
68.183.142.240 attackspambots
$f2bV_matches
2019-10-31 00:21:15
197.254.193.230 attack
445/tcp 445/tcp 445/tcp
[2019-10-30]3pkt
2019-10-31 00:01:26
197.33.209.34 attackbots
23/tcp
[2019-10-30]1pkt
2019-10-31 00:06:13

Recently Reported IPs

156.214.10.176 93.168.179.30 88.73.221.49 40.50.50.84
240.33.109.44 197.2.178.234 138.102.172.156 26.98.241.135
87.204.241.28 223.137.35.220 169.135.20.218 241.19.134.120
41.185.253.111 43.28.21.83 165.250.79.134 217.121.54.50
12.198.202.125 104.223.4.63 204.133.237.39 129.196.27.232