Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.232.55.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.232.55.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:42:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.55.232.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.55.232.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.236.134.112 attackbotsspam
2020-09-13T18:52:57.740639correo.[domain] sshd[44193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mon.do.safelinkinternet.com user=root 2020-09-13T18:52:59.815200correo.[domain] sshd[44193]: Failed password for root from 104.236.134.112 port 60284 ssh2 2020-09-13T18:59:00.283664correo.[domain] sshd[44792]: Invalid user admin from 104.236.134.112 port 38430 ...
2020-09-14 06:27:12
180.242.202.151 attack
Unauthorised access (Sep 14) SRC=180.242.202.151 LEN=40 TTL=54 ID=56074 TCP DPT=23 WINDOW=43096 SYN
2020-09-14 06:48:46
106.12.199.117 attack
Bruteforce detected by fail2ban
2020-09-14 06:44:00
222.186.173.154 attack
Sep 14 00:26:26 nuernberg-4g-01 sshd[14803]: Failed password for root from 222.186.173.154 port 26084 ssh2
Sep 14 00:26:31 nuernberg-4g-01 sshd[14803]: Failed password for root from 222.186.173.154 port 26084 ssh2
Sep 14 00:26:34 nuernberg-4g-01 sshd[14803]: Failed password for root from 222.186.173.154 port 26084 ssh2
Sep 14 00:26:38 nuernberg-4g-01 sshd[14803]: Failed password for root from 222.186.173.154 port 26084 ssh2
2020-09-14 06:41:35
222.186.180.8 attack
2020-09-13T22:34:30.856360shield sshd\[27139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2020-09-13T22:34:32.876965shield sshd\[27139\]: Failed password for root from 222.186.180.8 port 35450 ssh2
2020-09-13T22:34:35.683839shield sshd\[27139\]: Failed password for root from 222.186.180.8 port 35450 ssh2
2020-09-13T22:34:39.433806shield sshd\[27139\]: Failed password for root from 222.186.180.8 port 35450 ssh2
2020-09-13T22:34:42.734475shield sshd\[27139\]: Failed password for root from 222.186.180.8 port 35450 ssh2
2020-09-14 06:37:26
59.50.80.11 attackspambots
Sep 14 00:03:32 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:35 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:39 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
Sep 14 00:03:42 router sshd[20081]: Failed password for root from 59.50.80.11 port 41364 ssh2
...
2020-09-14 06:58:54
49.88.112.117 attack
Sep 13 18:07:18 ny01 sshd[27642]: Failed password for root from 49.88.112.117 port 27172 ssh2
Sep 13 18:07:20 ny01 sshd[27642]: Failed password for root from 49.88.112.117 port 27172 ssh2
Sep 13 18:07:22 ny01 sshd[27642]: Failed password for root from 49.88.112.117 port 27172 ssh2
2020-09-14 06:25:44
117.50.9.235 attack
Sep 13 21:13:33 mout sshd[15962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.9.235  user=root
Sep 13 21:13:34 mout sshd[15962]: Failed password for root from 117.50.9.235 port 60988 ssh2
2020-09-14 06:26:13
217.218.190.236 attackbotsspam
20/9/13@12:56:11: FAIL: Alarm-Network address from=217.218.190.236
20/9/13@12:56:11: FAIL: Alarm-Network address from=217.218.190.236
...
2020-09-14 07:00:24
176.10.99.200 attackspam
spammed contact form
2020-09-14 06:41:50
111.229.142.192 attackspambots
Sep 14 00:02:29 mail sshd[17307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192
Sep 14 00:02:31 mail sshd[17307]: Failed password for invalid user pula from 111.229.142.192 port 34414 ssh2
...
2020-09-14 06:25:19
34.123.149.227 attackspam
2020-09-13T22:00:50.409746abusebot-4.cloudsearch.cf sshd[23646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=227.149.123.34.bc.googleusercontent.com  user=root
2020-09-13T22:00:52.124638abusebot-4.cloudsearch.cf sshd[23646]: Failed password for root from 34.123.149.227 port 45544 ssh2
2020-09-13T22:04:30.684553abusebot-4.cloudsearch.cf sshd[23712]: Invalid user kouki from 34.123.149.227 port 58330
2020-09-13T22:04:30.691612abusebot-4.cloudsearch.cf sshd[23712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=227.149.123.34.bc.googleusercontent.com
2020-09-13T22:04:30.684553abusebot-4.cloudsearch.cf sshd[23712]: Invalid user kouki from 34.123.149.227 port 58330
2020-09-13T22:04:32.942616abusebot-4.cloudsearch.cf sshd[23712]: Failed password for invalid user kouki from 34.123.149.227 port 58330 ssh2
2020-09-13T22:08:17.075286abusebot-4.cloudsearch.cf sshd[23727]: pam_unix(sshd:auth): authentication failur
...
2020-09-14 06:55:08
93.150.76.177 attackspam
 TCP (SYN) 93.150.76.177:22421 -> port 8080, len 44
2020-09-14 06:55:29
51.178.17.221 attack
Sep 14 08:19:44 localhost sshd[1737369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.17.221  user=root
Sep 14 08:19:46 localhost sshd[1737369]: Failed password for root from 51.178.17.221 port 41492 ssh2
...
2020-09-14 06:36:18
144.217.70.190 attackbots
Automatic report - Banned IP Access
2020-09-14 06:43:43

Recently Reported IPs

140.200.237.175 40.0.169.9 220.232.232.233 187.135.113.174
215.146.248.5 59.31.231.163 101.237.84.8 61.103.243.254
142.150.79.53 36.1.221.33 168.124.60.4 65.245.84.147
189.71.173.222 237.211.132.93 140.148.94.99 163.107.149.114
162.33.195.141 75.210.34.36 87.46.117.165 42.218.60.80