Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.217.72.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.217.72.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 12:50:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
21.72.217.149.in-addr.arpa domain name pointer mx3.mpil.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.72.217.149.in-addr.arpa	name = mx3.mpil.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.65.226.83 attackspam
Unauthorized connection attempt from IP address 41.65.226.83 on Port 445(SMB)
2019-10-16 11:56:29
220.181.108.187 attackspambots
Bad bot/spoofed identity
2019-10-16 11:45:37
113.53.24.219 attack
Unauthorized connection attempt from IP address 113.53.24.219 on Port 445(SMB)
2019-10-16 11:39:05
118.99.93.46 attackspambots
Unauthorized connection attempt from IP address 118.99.93.46 on Port 445(SMB)
2019-10-16 12:08:40
42.113.40.44 attackspam
Unauthorized connection attempt from IP address 42.113.40.44 on Port 445(SMB)
2019-10-16 11:53:32
61.74.118.139 attackbotsspam
Oct 16 03:31:41 thevastnessof sshd[28805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.118.139
...
2019-10-16 12:11:23
185.175.93.14 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 2623 proto: TCP cat: Misc Attack
2019-10-16 11:57:11
222.186.173.183 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Failed password for root from 222.186.173.183 port 59274 ssh2
Failed password for root from 222.186.173.183 port 59274 ssh2
Failed password for root from 222.186.173.183 port 59274 ssh2
Failed password for root from 222.186.173.183 port 59274 ssh2
2019-10-16 11:37:35
177.69.213.236 attackbotsspam
leo_www
2019-10-16 12:00:02
188.166.226.209 attack
Oct 15 17:28:17 php1 sshd\[19006\]: Invalid user hikim from 188.166.226.209
Oct 15 17:28:17 php1 sshd\[19006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.209
Oct 15 17:28:19 php1 sshd\[19006\]: Failed password for invalid user hikim from 188.166.226.209 port 38078 ssh2
Oct 15 17:32:12 php1 sshd\[19347\]: Invalid user allotest from 188.166.226.209
Oct 15 17:32:12 php1 sshd\[19347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.226.209
2019-10-16 11:39:41
139.199.192.159 attackbots
Oct 16 05:27:35 * sshd[14712]: Failed password for root from 139.199.192.159 port 47358 ssh2
Oct 16 05:32:08 * sshd[15233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.159
2019-10-16 11:42:24
182.53.13.200 attackspambots
Unauthorized connection attempt from IP address 182.53.13.200 on Port 445(SMB)
2019-10-16 11:54:00
177.138.241.62 attackspam
SSH/22 MH Probe, BF, Hack -
2019-10-16 11:47:24
185.244.217.54 attack
Unauthorized connection attempt from IP address 185.244.217.54 on Port 445(SMB)
2019-10-16 11:59:41
27.159.65.114 attackbots
/var/log/messages:Oct 16 02:46:01 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1571193961.221:10251): pid=4687 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=4688 suid=74 rport=58830 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=27.159.65.114 terminal=? res=success'
/var/log/messages:Oct 16 02:46:01 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1571193961.225:10252): pid=4687 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aexxxxxxx28-ctr ksize=128 mac=hmac-sha2-256 pfs=diffie-hellman-group-exchange-sha256 spid=4688 suid=74 rport=58830 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=27.159.65.114 terminal=? res=success'
/var/log/messages:Oct 16 02:46:04 sanyalnet-........
-------------------------------
2019-10-16 11:52:32

Recently Reported IPs

18.238.245.78 146.104.249.120 114.60.57.198 53.158.140.205
211.237.235.18 255.60.231.75 159.26.41.138 220.106.97.195
153.46.52.156 123.56.223.211 245.61.99.1 240.73.245.27
205.163.140.198 46.173.52.33 79.169.105.169 90.209.32.0
55.116.90.55 70.255.177.159 146.96.201.72 144.220.221.231