Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.105.21.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.105.21.113.			IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092600 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 26 21:29:41 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 113.21.105.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.21.105.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
13.235.54.249 attackspambots
Sep 28 15:35:45 markkoudstaal sshd[24855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.235.54.249
Sep 28 15:35:48 markkoudstaal sshd[24855]: Failed password for invalid user operator from 13.235.54.249 port 43002 ssh2
Sep 28 15:40:30 markkoudstaal sshd[25451]: Failed password for root from 13.235.54.249 port 55908 ssh2
2019-09-29 02:34:30
183.207.181.138 attackspambots
Sep 28 19:34:29 vps647732 sshd[30606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.207.181.138
Sep 28 19:34:31 vps647732 sshd[30606]: Failed password for invalid user system from 183.207.181.138 port 47285 ssh2
...
2019-09-29 02:32:43
36.72.218.118 attackspam
Unauthorised access (Sep 28) SRC=36.72.218.118 LEN=52 TTL=117 ID=16495 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-29 02:36:46
68.183.236.66 attackspambots
web-1 [ssh_2] SSH Attack
2019-09-29 02:52:31
52.90.236.238 attackbots
by Amazon Technologies Inc.
2019-09-29 02:36:11
59.20.161.222 attackbotsspam
Unauthorised access (Sep 28) SRC=59.20.161.222 LEN=40 TTL=52 ID=22363 TCP DPT=8080 WINDOW=63600 SYN 
Unauthorised access (Sep 27) SRC=59.20.161.222 LEN=40 TTL=52 ID=11630 TCP DPT=8080 WINDOW=63600 SYN 
Unauthorised access (Sep 26) SRC=59.20.161.222 LEN=40 TTL=52 ID=9767 TCP DPT=8080 WINDOW=63600 SYN
2019-09-29 02:42:44
31.47.97.251 attackbots
Sep 28 18:22:13 marvibiene sshd[17811]: Invalid user swk from 31.47.97.251 port 35182
Sep 28 18:22:13 marvibiene sshd[17811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.47.97.251
Sep 28 18:22:13 marvibiene sshd[17811]: Invalid user swk from 31.47.97.251 port 35182
Sep 28 18:22:14 marvibiene sshd[17811]: Failed password for invalid user swk from 31.47.97.251 port 35182 ssh2
...
2019-09-29 02:25:01
181.40.73.86 attackbots
SSH bruteforce
2019-09-29 02:58:46
46.218.7.227 attackbotsspam
Sep 28 14:28:43 vmd17057 sshd\[27921\]: Invalid user ck from 46.218.7.227 port 45475
Sep 28 14:28:43 vmd17057 sshd\[27921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
Sep 28 14:28:46 vmd17057 sshd\[27921\]: Failed password for invalid user ck from 46.218.7.227 port 45475 ssh2
...
2019-09-29 02:56:15
84.121.165.180 attackspam
2019-09-28T18:01:01.712426hub.schaetter.us sshd\[16006\]: Invalid user cvsroot from 84.121.165.180 port 42922
2019-09-28T18:01:01.720073hub.schaetter.us sshd\[16006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180.dyn.user.ono.com
2019-09-28T18:01:03.568248hub.schaetter.us sshd\[16006\]: Failed password for invalid user cvsroot from 84.121.165.180 port 42922 ssh2
2019-09-28T18:04:31.092570hub.schaetter.us sshd\[16051\]: Invalid user ark from 84.121.165.180 port 54982
2019-09-28T18:04:31.101620hub.schaetter.us sshd\[16051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180.dyn.user.ono.com
...
2019-09-29 02:33:05
52.166.95.124 attack
Sep 28 05:10:14 hcbb sshd\[18963\]: Invalid user lv from 52.166.95.124
Sep 28 05:10:14 hcbb sshd\[18963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.166.95.124
Sep 28 05:10:16 hcbb sshd\[18963\]: Failed password for invalid user lv from 52.166.95.124 port 10093 ssh2
Sep 28 05:15:05 hcbb sshd\[19366\]: Invalid user admin from 52.166.95.124
Sep 28 05:15:05 hcbb sshd\[19366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.166.95.124
2019-09-29 02:37:06
42.115.221.40 attackspam
Sep 28 14:34:09 TORMINT sshd\[21488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.115.221.40  user=root
Sep 28 14:34:11 TORMINT sshd\[21488\]: Failed password for root from 42.115.221.40 port 39948 ssh2
Sep 28 14:38:56 TORMINT sshd\[21860\]: Invalid user admire from 42.115.221.40
Sep 28 14:38:56 TORMINT sshd\[21860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.115.221.40
...
2019-09-29 02:42:20
112.226.43.71 attackbots
(Sep 28)  LEN=40 TTL=49 ID=62117 TCP DPT=8080 WINDOW=17967 SYN 
 (Sep 28)  LEN=40 TTL=49 ID=17756 TCP DPT=8080 WINDOW=9400 SYN 
 (Sep 28)  LEN=40 TTL=49 ID=11851 TCP DPT=8080 WINDOW=39927 SYN 
 (Sep 27)  LEN=40 TTL=49 ID=39587 TCP DPT=8080 WINDOW=9400 SYN 
 (Sep 27)  LEN=40 TTL=49 ID=42291 TCP DPT=8080 WINDOW=39927 SYN 
 (Sep 27)  LEN=40 TTL=49 ID=49601 TCP DPT=8080 WINDOW=39927 SYN 
 (Sep 26)  LEN=40 TTL=49 ID=56834 TCP DPT=8080 WINDOW=9400 SYN 
 (Sep 26)  LEN=40 TTL=49 ID=65263 TCP DPT=8080 WINDOW=39927 SYN 
 (Sep 25)  LEN=40 TTL=49 ID=32781 TCP DPT=8080 WINDOW=39927 SYN 
 (Sep 24)  LEN=40 TTL=49 ID=51844 TCP DPT=8080 WINDOW=17967 SYN
2019-09-29 02:31:34
120.10.11.65 attack
Unauthorised access (Sep 28) SRC=120.10.11.65 LEN=40 TTL=49 ID=58898 TCP DPT=8080 WINDOW=41713 SYN 
Unauthorised access (Sep 27) SRC=120.10.11.65 LEN=40 TTL=49 ID=58972 TCP DPT=8080 WINDOW=41713 SYN 
Unauthorised access (Sep 27) SRC=120.10.11.65 LEN=40 TTL=49 ID=48603 TCP DPT=8080 WINDOW=41713 SYN 
Unauthorised access (Sep 26) SRC=120.10.11.65 LEN=40 TTL=49 ID=36495 TCP DPT=8080 WINDOW=41713 SYN
2019-09-29 02:55:17
139.59.108.237 attackbots
[ssh] SSH attack
2019-09-29 02:51:23

Recently Reported IPs

151.15.130.93 75.163.15.163 202.254.234.35 80.11.53.199
22.17.88.180 28.115.244.85 204.225.228.147 203.253.223.167
199.209.103.254 219.215.207.224 47.248.235.247 124.146.129.36
227.236.93.141 75.46.134.165 145.114.85.244 199.156.96.161
186.180.156.8 71.187.71.88 76.250.115.134 101.150.130.19