Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.92.112.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.92.112.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 02:14:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.112.92.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.112.92.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.81.211.54 attack
Unauthorized connection attempt from IP address 88.81.211.54 on Port 445(SMB)
2020-05-24 04:45:41
178.128.247.181 attack
May 23 23:52:45 pkdns2 sshd\[20840\]: Invalid user eqe from 178.128.247.181May 23 23:52:47 pkdns2 sshd\[20840\]: Failed password for invalid user eqe from 178.128.247.181 port 40982 ssh2May 23 23:55:58 pkdns2 sshd\[21040\]: Invalid user yvh from 178.128.247.181May 23 23:56:01 pkdns2 sshd\[21040\]: Failed password for invalid user yvh from 178.128.247.181 port 46760 ssh2May 23 23:59:07 pkdns2 sshd\[21233\]: Invalid user lvz from 178.128.247.181May 23 23:59:09 pkdns2 sshd\[21233\]: Failed password for invalid user lvz from 178.128.247.181 port 52564 ssh2
...
2020-05-24 05:01:04
52.231.154.239 attackbots
May 23 22:15:17 debian-2gb-nbg1-2 kernel: \[12523728.122924\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=52.231.154.239 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=54321 PROTO=TCP SPT=36860 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0
2020-05-24 05:11:12
112.35.57.139 attackbots
2020-05-23T20:11:11.830423abusebot-3.cloudsearch.cf sshd[5653]: Invalid user qli from 112.35.57.139 port 38234
2020-05-23T20:11:11.836291abusebot-3.cloudsearch.cf sshd[5653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.57.139
2020-05-23T20:11:11.830423abusebot-3.cloudsearch.cf sshd[5653]: Invalid user qli from 112.35.57.139 port 38234
2020-05-23T20:11:14.383518abusebot-3.cloudsearch.cf sshd[5653]: Failed password for invalid user qli from 112.35.57.139 port 38234 ssh2
2020-05-23T20:15:18.385462abusebot-3.cloudsearch.cf sshd[5896]: Invalid user mlz from 112.35.57.139 port 36658
2020-05-23T20:15:18.396110abusebot-3.cloudsearch.cf sshd[5896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.57.139
2020-05-23T20:15:18.385462abusebot-3.cloudsearch.cf sshd[5896]: Invalid user mlz from 112.35.57.139 port 36658
2020-05-23T20:15:20.517051abusebot-3.cloudsearch.cf sshd[5896]: Failed password for inva
...
2020-05-24 05:05:18
178.62.55.19 attack
Masscan Port Scanning Tool Detection
2020-05-24 05:03:09
68.183.227.196 attackbotsspam
May 23 21:15:40 ajax sshd[11260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 
May 23 21:15:41 ajax sshd[11260]: Failed password for invalid user xinji from 68.183.227.196 port 38994 ssh2
2020-05-24 04:38:48
211.253.10.96 attackspam
2020-05-23T22:13:15.518714struts4.enskede.local sshd\[12963\]: Invalid user tkt from 211.253.10.96 port 47866
2020-05-23T22:13:15.525375struts4.enskede.local sshd\[12963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96
2020-05-23T22:13:18.879520struts4.enskede.local sshd\[12963\]: Failed password for invalid user tkt from 211.253.10.96 port 47866 ssh2
2020-05-23T22:16:55.852509struts4.enskede.local sshd\[12968\]: Invalid user bad from 211.253.10.96 port 52344
2020-05-23T22:16:55.860607struts4.enskede.local sshd\[12968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96
...
2020-05-24 05:05:49
198.71.238.18 attackbots
C1,WP GET /lappan/en/wp-includes/wlwmanifest.xml
2020-05-24 05:12:25
187.192.53.121 attackbots
Unauthorized connection attempt from IP address 187.192.53.121 on Port 445(SMB)
2020-05-24 05:14:26
217.91.99.128 attack
2020-05-23T22:10:11.044682sd-86998 sshd[23622]: Invalid user mkr from 217.91.99.128 port 58638
2020-05-23T22:10:11.049669sd-86998 sshd[23622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd95b6380.dip0.t-ipconnect.de
2020-05-23T22:10:11.044682sd-86998 sshd[23622]: Invalid user mkr from 217.91.99.128 port 58638
2020-05-23T22:10:13.361430sd-86998 sshd[23622]: Failed password for invalid user mkr from 217.91.99.128 port 58638 ssh2
2020-05-23T22:15:31.447483sd-86998 sshd[24267]: Invalid user nv from 217.91.99.128 port 33351
...
2020-05-24 04:50:58
177.42.106.148 attack
Unauthorized connection attempt from IP address 177.42.106.148 on Port 445(SMB)
2020-05-24 04:39:12
212.83.183.57 attack
May 23 22:06:41 Invalid user jhk from 212.83.183.57 port 59515
2020-05-24 04:43:30
196.219.61.97 attackspambots
Unauthorized connection attempt from IP address 196.219.61.97 on Port 445(SMB)
2020-05-24 05:13:26
85.111.77.29 attackspambots
Unauthorized connection attempt from IP address 85.111.77.29 on Port 445(SMB)
2020-05-24 04:52:43
142.44.242.38 attack
SSH Brute-Force reported by Fail2Ban
2020-05-24 05:00:27

Recently Reported IPs

28.79.175.145 182.110.149.26 57.39.95.12 157.180.70.254
81.206.190.112 75.213.168.227 147.187.102.178 98.216.217.87
39.251.31.106 246.215.100.46 32.227.179.40 166.36.118.88
162.67.17.244 41.121.21.129 22.171.38.49 157.52.244.199
230.204.119.147 205.251.202.61 7.184.51.17 162.165.85.188