Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.213.21.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;160.213.21.217.			IN	A

;; AUTHORITY SECTION:
.			250	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051702 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 18 12:55:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 217.21.213.160.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.21.213.160.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.170.65.115 attack
Dec 27 07:27:07 sd-53420 sshd\[9816\]: User backup from 107.170.65.115 not allowed because none of user's groups are listed in AllowGroups
Dec 27 07:27:07 sd-53420 sshd\[9816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.65.115  user=backup
Dec 27 07:27:08 sd-53420 sshd\[9816\]: Failed password for invalid user backup from 107.170.65.115 port 49406 ssh2
Dec 27 07:30:15 sd-53420 sshd\[11147\]: User root from 107.170.65.115 not allowed because none of user's groups are listed in AllowGroups
Dec 27 07:30:15 sd-53420 sshd\[11147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.65.115  user=root
...
2019-12-27 14:53:44
14.190.134.206 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-12-2019 04:55:09.
2019-12-27 14:29:17
103.91.54.100 attackbots
Dec 26 11:28:50 server sshd\[24123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.54.100  user=root
Dec 26 11:28:52 server sshd\[24123\]: Failed password for root from 103.91.54.100 port 33313 ssh2
Dec 27 09:30:03 server sshd\[5558\]: Invalid user guest from 103.91.54.100
Dec 27 09:30:03 server sshd\[5558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.54.100 
Dec 27 09:30:05 server sshd\[5558\]: Failed password for invalid user guest from 103.91.54.100 port 58296 ssh2
...
2019-12-27 15:05:58
112.85.42.181 attackspam
$f2bV_matches
2019-12-27 15:04:02
188.225.56.5 attackspambots
3388/tcp 3399/tcp 63389/tcp...
[2019-11-27/12-27]194pkt,59pt.(tcp)
2019-12-27 14:49:19
200.146.232.97 attackspam
Dec 27 06:24:42 pi sshd\[17035\]: Invalid user delois from 200.146.232.97 port 56371
Dec 27 06:24:42 pi sshd\[17035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
Dec 27 06:24:43 pi sshd\[17035\]: Failed password for invalid user delois from 200.146.232.97 port 56371 ssh2
Dec 27 06:30:08 pi sshd\[17230\]: Invalid user passwd222 from 200.146.232.97 port 41882
Dec 27 06:30:08 pi sshd\[17230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.232.97
...
2019-12-27 14:57:59
49.88.112.61 attackbotsspam
2019-12-27T06:31:04.613870homeassistant sshd[12828]: Failed none for root from 49.88.112.61 port 42035 ssh2
2019-12-27T06:31:04.891910homeassistant sshd[12828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.61  user=root
...
2019-12-27 14:45:03
183.144.77.208 attackbotsspam
Port Scan
2019-12-27 14:58:50
160.16.196.174 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-12-27 14:59:58
218.92.0.164 attack
Dec 27 07:30:26 silence02 sshd[12149]: Failed password for root from 218.92.0.164 port 20265 ssh2
Dec 27 07:30:39 silence02 sshd[12149]: error: maximum authentication attempts exceeded for root from 218.92.0.164 port 20265 ssh2 [preauth]
Dec 27 07:30:45 silence02 sshd[12157]: Failed password for root from 218.92.0.164 port 57457 ssh2
2019-12-27 14:46:35
218.92.0.189 attackspambots
12/27/2019-01:30:29.235223 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan
2019-12-27 14:46:18
146.88.240.4 attack
Dec 27 07:41:09 debian-2gb-nbg1-2 kernel: \[1081593.707038\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=32 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=UDP SPT=58490 DPT=5683 LEN=12
2019-12-27 14:44:37
92.118.160.45 attack
7547/tcp 5909/tcp 44818/udp...
[2019-10-26/12-27]114pkt,61pt.(tcp),8pt.(udp),1tp.(icmp)
2019-12-27 15:06:55
175.16.138.160 attackbotsspam
Unauthorised access (Dec 27) SRC=175.16.138.160 LEN=40 TTL=49 ID=42441 TCP DPT=8080 WINDOW=37711 SYN 
Unauthorised access (Dec 24) SRC=175.16.138.160 LEN=40 TTL=49 ID=28788 TCP DPT=8080 WINDOW=19056 SYN 
Unauthorised access (Dec 24) SRC=175.16.138.160 LEN=40 TTL=49 ID=54998 TCP DPT=8080 WINDOW=14847 SYN 
Unauthorised access (Dec 24) SRC=175.16.138.160 LEN=40 TTL=49 ID=51293 TCP DPT=8080 WINDOW=37711 SYN 
Unauthorised access (Dec 24) SRC=175.16.138.160 LEN=40 TTL=49 ID=11751 TCP DPT=8080 WINDOW=19056 SYN 
Unauthorised access (Dec 23) SRC=175.16.138.160 LEN=40 TTL=49 ID=56531 TCP DPT=8080 WINDOW=19056 SYN 
Unauthorised access (Dec 23) SRC=175.16.138.160 LEN=40 TTL=49 ID=62740 TCP DPT=8080 WINDOW=37711 SYN 
Unauthorised access (Dec 22) SRC=175.16.138.160 LEN=40 TTL=49 ID=8589 TCP DPT=8080 WINDOW=14847 SYN 
Unauthorised access (Dec 22) SRC=175.16.138.160 LEN=40 TTL=49 ID=25075 TCP DPT=8080 WINDOW=14847 SYN
2019-12-27 14:51:02
3.130.89.32 attackspambots
2019-12-27T06:03:31.412122shield sshd\[17665\]: Invalid user srvbkp from 3.130.89.32 port 41238
2019-12-27T06:03:31.416343shield sshd\[17665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-130-89-32.us-east-2.compute.amazonaws.com
2019-12-27T06:03:33.261145shield sshd\[17665\]: Failed password for invalid user srvbkp from 3.130.89.32 port 41238 ssh2
2019-12-27T06:07:50.471010shield sshd\[18326\]: Invalid user test from 3.130.89.32 port 46174
2019-12-27T06:07:50.475705shield sshd\[18326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-130-89-32.us-east-2.compute.amazonaws.com
2019-12-27 14:19:06

Recently Reported IPs

64.30.4.1 39.39.39.1 136.164.96.90 221.222.132.58
11.90.140.229 136.6.122.109 5.185.124.140 2.43.254.47
48.19.145.243 50.32.25.187 111.109.12.222 85.84.205.224
125.5.2.8 46.49.233.110 230.5.211.201 242.177.233.38
246.54.125.238 9.204.93.189 88.227.4.52 223.53.70.166