Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Takao

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.16.245.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.16.245.21.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111101 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 12 13:22:24 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 21.245.16.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.245.16.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.207.51.190 attack
Aug  2 22:27:33 icinga sshd[15749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.51.190
Aug  2 22:27:34 icinga sshd[15749]: Failed password for invalid user yang from 140.207.51.190 port 56234 ssh2
...
2019-08-03 06:02:59
51.38.134.189 attackspambots
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-08-03 06:40:18
156.220.188.58 attack
SSH bruteforce (Triggered fail2ban)
2019-08-03 06:21:04
201.20.73.195 attackbotsspam
2019-08-02T21:54:40.506240abusebot.cloudsearch.cf sshd\[3722\]: Invalid user chuan from 201.20.73.195 port 51690
2019-08-03 05:57:50
192.145.239.44 attackspambots
A user with IP addr 192.145.239.44 has been locked out from signing in or using the password recovery form for the following reason: Used an invalid username 'admin' to try to sign in.
User IP: 192.145.239.44
User hostname: res203.servconfig.com
User location: Los Angeles, United States
2019-08-03 06:09:52
200.59.11.115 attackspambots
Unauthorised access (Aug  2) SRC=200.59.11.115 LEN=40 TTL=54 ID=31439 TCP DPT=8080 WINDOW=24019 SYN
2019-08-03 05:58:45
27.150.169.223 attackspam
Aug  3 01:13:50 server sshd\[20889\]: Invalid user sonja from 27.150.169.223 port 33925
Aug  3 01:13:50 server sshd\[20889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.169.223
Aug  3 01:13:52 server sshd\[20889\]: Failed password for invalid user sonja from 27.150.169.223 port 33925 ssh2
Aug  3 01:19:03 server sshd\[27621\]: Invalid user skkb from 27.150.169.223 port 59515
Aug  3 01:19:03 server sshd\[27621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.150.169.223
2019-08-03 06:23:29
192.241.138.59 attackbotsspam
Aug  2 23:37:04 dedicated sshd[3651]: Invalid user sup from 192.241.138.59 port 50178
2019-08-03 05:59:02
182.75.86.238 attackbots
2019-08-02T21:39:00.874844abusebot-5.cloudsearch.cf sshd\[21231\]: Invalid user adela from 182.75.86.238 port 50635
2019-08-03 05:54:14
119.29.186.34 attack
Aug  2 22:47:17 lnxded63 sshd[10020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.186.34
2019-08-03 06:06:17
13.56.44.232 attack
Aug  3 01:00:45 www sshd\[13222\]: Invalid user samba from 13.56.44.232Aug  3 01:00:47 www sshd\[13222\]: Failed password for invalid user samba from 13.56.44.232 port 48198 ssh2Aug  3 01:05:19 www sshd\[13408\]: Invalid user kp from 13.56.44.232
...
2019-08-03 06:15:32
54.37.129.235 attack
Aug  2 21:27:16 MK-Soft-Root1 sshd\[2958\]: Invalid user uftp from 54.37.129.235 port 39802
Aug  2 21:27:16 MK-Soft-Root1 sshd\[2958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.129.235
Aug  2 21:27:18 MK-Soft-Root1 sshd\[2958\]: Failed password for invalid user uftp from 54.37.129.235 port 39802 ssh2
...
2019-08-03 06:08:28
117.93.23.252 attackbots
leo_www
2019-08-03 06:24:54
60.225.165.125 attack
Automatic report - Banned IP Access
2019-08-03 06:19:08
123.148.211.17 attack
123.148.211.17 - - [02/Aug/2019:21:27:02 +0200] "POST /wp-login.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
123.148.211.17 - - [02/Aug/2019:21:27:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
123.148.211.17 - - [02/Aug/2019:21:27:07 +0200] "POST /wp-login.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
123.148.211.17 - - [02/Aug/2019:21:27:08 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
123.148.211.17 - - [02/Aug/2019:21:27:10 +0200] "POST /wp-login.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.3
2019-08-03 06:05:17

Recently Reported IPs

125.167.178.202 212.64.102.29 77.42.79.69 2.143.57.35
204.27.60.14 109.169.72.60 115.61.114.86 160.187.128.57
42.232.216.66 129.126.127.157 31.34.104.113 162.173.122.7
216.34.191.173 179.106.23.42 130.4.34.141 134.34.46.15
155.222.167.73 134.190.148.30 182.117.107.237 182.122.180.94