Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.142.221.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.142.221.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 15:22:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 21.221.142.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.221.142.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.110.126 attack
SSH Brute-Forcing (server1)
2020-03-11 22:48:13
165.22.73.156 attackspambots
Mar 11 11:43:38 srv206 sshd[15406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.73.156  user=root
Mar 11 11:43:39 srv206 sshd[15406]: Failed password for root from 165.22.73.156 port 51442 ssh2
...
2020-03-11 22:53:54
115.72.161.217 attackbotsspam
SSH login attempts brute force.
2020-03-11 23:06:04
111.229.142.118 attack
$f2bV_matches
2020-03-11 22:39:01
176.31.182.79 attackspambots
Mar 11 12:50:15 marvibiene sshd[20621]: Invalid user gbcluster from 176.31.182.79 port 34192
Mar 11 12:50:15 marvibiene sshd[20621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.79
Mar 11 12:50:15 marvibiene sshd[20621]: Invalid user gbcluster from 176.31.182.79 port 34192
Mar 11 12:50:16 marvibiene sshd[20621]: Failed password for invalid user gbcluster from 176.31.182.79 port 34192 ssh2
...
2020-03-11 22:47:06
176.9.228.105 attack
Mar 11 00:38:46 ovpn sshd[623]: Invalid user phil from 176.9.228.105
Mar 11 00:38:46 ovpn sshd[623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.9.228.105
Mar 11 00:38:48 ovpn sshd[623]: Failed password for invalid user phil from 176.9.228.105 port 44360 ssh2
Mar 11 00:38:48 ovpn sshd[623]: Received disconnect from 176.9.228.105 port 44360:11: Bye Bye [preauth]
Mar 11 00:38:48 ovpn sshd[623]: Disconnected from 176.9.228.105 port 44360 [preauth]
Mar 11 00:51:28 ovpn sshd[3861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.9.228.105  user=r.r
Mar 11 00:51:29 ovpn sshd[3861]: Failed password for r.r from 176.9.228.105 port 45358 ssh2
Mar 11 00:51:29 ovpn sshd[3861]: Received disconnect from 176.9.228.105 port 45358:11: Bye Bye [preauth]
Mar 11 00:51:29 ovpn sshd[3861]: Disconnected from 176.9.228.105 port 45358 [preauth]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2020-03-11 22:32:08
108.177.97.27 attackspambots
SSH login attempts.
2020-03-11 23:02:29
45.156.184.80 attack
2020-03-11T21:43:29.019648luisaranguren sshd[1911751]: Failed password for root from 45.156.184.80 port 48216 ssh2
2020-03-11T21:43:29.821800luisaranguren sshd[1911751]: Disconnected from authenticating user root 45.156.184.80 port 48216 [preauth]
...
2020-03-11 23:07:54
137.74.209.84 attackspambots
Mar 11 11:25:42 mxgate1 postfix/postscreen[6311]: CONNECT from [137.74.209.84]:51549 to [176.31.12.44]:25
Mar 11 11:25:42 mxgate1 postfix/dnsblog[6334]: addr 137.74.209.84 listed by domain zen.spamhaus.org as 127.0.0.3
Mar 11 11:25:48 mxgate1 postfix/postscreen[6311]: DNSBL rank 2 for [137.74.209.84]:51549
Mar 11 11:25:48 mxgate1 postfix/tlsproxy[6738]: CONNECT from [137.74.209.84]:51549
Mar x@x
Mar 11 11:25:48 mxgate1 postfix/postscreen[6311]: DISCONNECT [137.74.209.84]:51549
Mar 11 11:25:48 mxgate1 postfix/tlsproxy[6738]: DISCONNECT [137.74.209.84]:51549


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=137.74.209.84
2020-03-11 23:01:53
206.189.156.198 attackspam
Mar 11 15:40:23 lnxmail61 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.156.198
2020-03-11 22:56:16
182.52.103.128 attackspam
Honeypot attack, port: 445, PTR: node-kg0.pool-182-52.dynamic.totinternet.net.
2020-03-11 22:51:36
104.248.71.7 attack
Mar 11 08:50:37 firewall sshd[9115]: Invalid user admin1 from 104.248.71.7
Mar 11 08:50:39 firewall sshd[9115]: Failed password for invalid user admin1 from 104.248.71.7 port 50618 ssh2
Mar 11 08:53:19 firewall sshd[9199]: Invalid user user from 104.248.71.7
...
2020-03-11 22:57:07
159.192.98.3 attackbots
Mar 11 13:40:36 marvibiene sshd[21140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3  user=root
Mar 11 13:40:39 marvibiene sshd[21140]: Failed password for root from 159.192.98.3 port 35660 ssh2
Mar 11 13:51:04 marvibiene sshd[21219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3  user=root
Mar 11 13:51:06 marvibiene sshd[21219]: Failed password for root from 159.192.98.3 port 58072 ssh2
...
2020-03-11 22:54:18
139.199.74.92 attackspam
2020-03-11T11:41:32.834576v22018076590370373 sshd[14727]: Failed password for root from 139.199.74.92 port 41220 ssh2
2020-03-11T11:44:53.840696v22018076590370373 sshd[2808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92  user=root
2020-03-11T11:44:56.422942v22018076590370373 sshd[2808]: Failed password for root from 139.199.74.92 port 51854 ssh2
2020-03-11T11:46:36.841798v22018076590370373 sshd[20761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.74.92  user=root
2020-03-11T11:46:38.896921v22018076590370373 sshd[20761]: Failed password for root from 139.199.74.92 port 43054 ssh2
...
2020-03-11 23:09:21
94.102.57.241 attackbots
scans 3 times in preceeding hours on the ports (in chronological order) 9527 34567 9527 resulting in total of 16 scans from 94.102.48.0/20 block.
2020-03-11 22:35:58

Recently Reported IPs

89.239.23.43 173.235.207.11 214.236.48.65 218.22.13.64
163.173.187.189 211.113.15.35 206.42.10.129 156.76.222.90
135.190.90.110 107.190.199.136 108.74.185.124 148.135.223.138
240.73.99.214 148.86.122.169 6.190.201.72 71.142.35.35
27.253.37.15 240.171.202.105 24.116.20.163 220.157.33.243