Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.212.194.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.212.194.21.			IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030600 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 17:05:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 21.194.212.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.194.212.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.230.23.191 attackspambots
Total attacks: 2
2020-07-17 03:36:18
13.68.252.36 attackspam
Jul 16 18:56:35 *hidden* sshd[53564]: Failed password for *hidden* from 13.68.252.36 port 37250 ssh2
2020-07-17 03:56:20
104.129.194.89 attackspambots
Jul 16 13:45:22 IngegnereFirenze sshd[23444]: Failed password for invalid user jian from 104.129.194.89 port 46013 ssh2
...
2020-07-17 03:30:54
52.188.158.119 attack
Fail2Ban Ban Triggered
2020-07-17 03:55:51
200.129.242.4 attackspam
Jul 16 21:45:01 buvik sshd[28845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.129.242.4
Jul 16 21:45:03 buvik sshd[28845]: Failed password for invalid user odoouser from 200.129.242.4 port 1171 ssh2
Jul 16 21:52:37 buvik sshd[30046]: Invalid user deploy from 200.129.242.4
...
2020-07-17 03:56:33
61.144.96.20 attackbots
Jul 16 05:42:22 h2034429 sshd[10765]: Invalid user dropbox from 61.144.96.20
Jul 16 05:42:22 h2034429 sshd[10765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.96.20
Jul 16 05:42:23 h2034429 sshd[10765]: Failed password for invalid user dropbox from 61.144.96.20 port 54334 ssh2
Jul 16 05:42:24 h2034429 sshd[10765]: Received disconnect from 61.144.96.20 port 54334:11: Bye Bye [preauth]
Jul 16 05:42:24 h2034429 sshd[10765]: Disconnected from 61.144.96.20 port 54334 [preauth]
Jul 16 06:08:52 h2034429 sshd[11161]: Connection closed by 61.144.96.20 port 50206 [preauth]
Jul 16 06:12:49 h2034429 sshd[11295]: Invalid user dhis from 61.144.96.20
Jul 16 06:12:49 h2034429 sshd[11295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.96.20
Jul 16 06:12:52 h2034429 sshd[11295]: Failed password for invalid user dhis from 61.144.96.20 port 52042 ssh2
Jul 16 06:12:52 h2034429 sshd[11295]: Re........
-------------------------------
2020-07-17 03:58:00
123.206.45.16 attack
Jul 16 16:15:12 vps687878 sshd\[29078\]: Invalid user rupesh from 123.206.45.16 port 40152
Jul 16 16:15:12 vps687878 sshd\[29078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.45.16
Jul 16 16:15:13 vps687878 sshd\[29078\]: Failed password for invalid user rupesh from 123.206.45.16 port 40152 ssh2
Jul 16 16:21:29 vps687878 sshd\[29623\]: Invalid user pos from 123.206.45.16 port 44592
Jul 16 16:21:29 vps687878 sshd\[29623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.45.16
...
2020-07-17 04:02:24
213.6.130.133 attackbots
Jul 16 17:49:59 pve1 sshd[30434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.130.133 
Jul 16 17:50:01 pve1 sshd[30434]: Failed password for invalid user test from 213.6.130.133 port 51856 ssh2
...
2020-07-17 04:08:30
36.57.88.241 attack
Jul 16 17:27:34 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:27:47 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:04 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:23 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:35 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-17 04:04:12
5.135.185.27 attackspambots
Failed password for invalid user wangrui from 5.135.185.27 port 46934 ssh2
Invalid user exp from 5.135.185.27 port 33720
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.185.27
Failed password for invalid user exp from 5.135.185.27 port 33720 ssh2
Invalid user kubernetes from 5.135.185.27 port 48744
2020-07-17 03:36:38
65.50.209.87 attack
2020-07-16T21:40:12.113676snf-827550 sshd[25402]: Invalid user doku from 65.50.209.87 port 37098
2020-07-16T21:40:14.537884snf-827550 sshd[25402]: Failed password for invalid user doku from 65.50.209.87 port 37098 ssh2
2020-07-16T21:45:30.450289snf-827550 sshd[25423]: Invalid user gss from 65.50.209.87 port 39472
...
2020-07-17 04:06:48
94.25.164.150 attackspambots
1594907094 - 07/16/2020 15:44:54 Host: 94.25.164.150/94.25.164.150 Port: 445 TCP Blocked
2020-07-17 04:06:26
111.47.18.22 attack
Jul 16 15:40:54 Invalid user ftp from 111.47.18.22 port 2065
2020-07-17 03:59:49
85.217.204.38 attackspam
SMB Server BruteForce Attack
2020-07-17 03:38:44
218.92.0.158 attackspam
Jul 16 21:42:47 abendstille sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Jul 16 21:42:49 abendstille sshd\[14323\]: Failed password for root from 218.92.0.158 port 42673 ssh2
Jul 16 21:42:52 abendstille sshd\[14323\]: Failed password for root from 218.92.0.158 port 42673 ssh2
Jul 16 21:42:56 abendstille sshd\[14323\]: Failed password for root from 218.92.0.158 port 42673 ssh2
Jul 16 21:42:59 abendstille sshd\[14323\]: Failed password for root from 218.92.0.158 port 42673 ssh2
...
2020-07-17 03:48:27

Recently Reported IPs

117.212.194.206 117.212.194.212 117.212.194.214 117.212.194.210
117.212.194.216 117.212.194.218 117.212.194.220 117.212.194.222
117.212.194.208 117.212.194.225 117.212.194.227 117.212.194.228
117.212.194.23 117.212.194.230 117.212.194.235 117.212.194.232
117.212.194.236 117.212.194.240 117.212.194.238 117.212.194.241