Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.82.245.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.82.245.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 05:03:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.245.82.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.245.82.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.96.32.106 attack
8080/tcp
[2019-07-19]1pkt
2019-07-20 00:49:24
95.90.218.42 attackbotsspam
Jul 19 07:45:20 server postfix/smtpd[18837]: NOQUEUE: reject: RCPT from ip5f5ada2a.dynamic.kabel-deutschland.de[95.90.218.42]: 554 5.7.1 Service unavailable; Client host [95.90.218.42] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/95.90.218.42; from= to= proto=ESMTP helo=
2019-07-20 00:12:01
138.197.153.228 attack
2019-07-19T16:18:29.967734abusebot-6.cloudsearch.cf sshd\[14960\]: Invalid user alinus from 138.197.153.228 port 40716
2019-07-20 00:28:27
182.176.19.3 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-07-11/19]7pkt,1pt.(tcp)
2019-07-19 23:43:02
193.70.90.59 attackbots
Jul 19 15:13:07 ArkNodeAT sshd\[23211\]: Invalid user gitlab from 193.70.90.59
Jul 19 15:13:07 ArkNodeAT sshd\[23211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.90.59
Jul 19 15:13:09 ArkNodeAT sshd\[23211\]: Failed password for invalid user gitlab from 193.70.90.59 port 37042 ssh2
2019-07-20 00:08:01
196.46.36.144 attackbotsspam
Jul 19 16:32:34 thevastnessof sshd[7747]: Failed password for invalid user testuser from 196.46.36.144 port 48268 ssh2
...
2019-07-20 00:54:17
159.65.148.241 attackspam
2019-07-19T14:52:31.434304Z 24d8faa47db6 New connection: 159.65.148.241:37048 (172.17.0.4:2222) [session: 24d8faa47db6]
2019-07-19T14:56:41.923714Z d8ab5febd5d5 New connection: 159.65.148.241:38824 (172.17.0.4:2222) [session: d8ab5febd5d5]
2019-07-20 00:10:43
5.62.41.147 attackbots
\[2019-07-19 12:25:24\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8309' - Wrong password
\[2019-07-19 12:25:24\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-19T12:25:24.596-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4090",SessionID="0x7f06f8232278",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/62814",Challenge="3d3d4be3",ReceivedChallenge="3d3d4be3",ReceivedHash="1b5182e7400b6786f62688ed2ce85ce8"
\[2019-07-19 12:26:42\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8289' - Wrong password
\[2019-07-19 12:26:42\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-19T12:26:42.534-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4091",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/6
2019-07-20 00:41:59
132.232.13.229 attackspambots
2019-07-19T16:38:47.6159091240 sshd\[13636\]: Invalid user ankit from 132.232.13.229 port 57412
2019-07-19T16:38:47.6224351240 sshd\[13636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.13.229
2019-07-19T16:38:49.7064261240 sshd\[13636\]: Failed password for invalid user ankit from 132.232.13.229 port 57412 ssh2
...
2019-07-20 00:22:22
139.59.59.90 attackspam
Jul 19 12:01:34 debian sshd\[7978\]: Invalid user pascal from 139.59.59.90 port 22335
Jul 19 12:01:34 debian sshd\[7978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.90
Jul 19 12:01:35 debian sshd\[7978\]: Failed password for invalid user pascal from 139.59.59.90 port 22335 ssh2
...
2019-07-20 00:47:50
73.3.136.192 attackspam
Jul 19 18:42:26 v22018076622670303 sshd\[2318\]: Invalid user lauren from 73.3.136.192 port 36310
Jul 19 18:42:26 v22018076622670303 sshd\[2318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.3.136.192
Jul 19 18:42:28 v22018076622670303 sshd\[2318\]: Failed password for invalid user lauren from 73.3.136.192 port 36310 ssh2
...
2019-07-20 00:47:17
85.165.59.206 attack
Jul 19 07:44:41 mout sshd[4689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.165.59.206
Jul 19 07:44:41 mout sshd[4689]: Invalid user admin from 85.165.59.206 port 42932
Jul 19 07:44:43 mout sshd[4689]: Failed password for invalid user admin from 85.165.59.206 port 42932 ssh2
2019-07-20 00:30:55
115.70.58.142 attackbotsspam
445/tcp
[2019-07-19]1pkt
2019-07-20 00:44:43
115.48.142.61 attackspambots
23/tcp
[2019-07-19]1pkt
2019-07-20 00:38:01
164.68.101.157 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-19 23:45:48

Recently Reported IPs

108.78.227.20 116.100.16.175 205.99.227.249 180.207.107.221
88.190.123.66 237.238.142.19 143.115.2.128 238.52.57.96
126.202.156.225 214.35.120.19 244.173.15.233 236.68.118.122
198.229.85.141 45.181.145.225 133.108.128.187 255.27.229.216
85.11.84.179 103.183.195.58 7.29.13.192 130.49.117.106