Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.21.138.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.21.138.119.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:31:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 119.138.21.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.138.21.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.190.4.130 attackbotsspam
2019-11-11T20:31:40.359447scmdmz1 sshd\[23166\]: Invalid user squid from 213.190.4.130 port 38034
2019-11-11T20:31:40.362115scmdmz1 sshd\[23166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.190.4.130
2019-11-11T20:31:42.996808scmdmz1 sshd\[23166\]: Failed password for invalid user squid from 213.190.4.130 port 38034 ssh2
...
2019-11-12 04:15:54
198.27.106.140 attackbotsspam
Automatic report - Port Scan
2019-11-12 04:36:12
129.28.97.252 attack
Invalid user arleta from 129.28.97.252 port 59786
2019-11-12 04:32:36
85.167.56.111 attack
Nov 11 12:50:35 ny01 sshd[6951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.167.56.111
Nov 11 12:50:38 ny01 sshd[6951]: Failed password for invalid user love1314 from 85.167.56.111 port 46888 ssh2
Nov 11 12:57:41 ny01 sshd[7977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.167.56.111
2019-11-12 04:35:26
172.248.46.243 attackspambots
Web Attack: Shenzhen TVT DVR Remote Code Execution
2019-11-12 04:20:37
209.107.216.141 attackspam
Owner at this IP address has hacked several wordpress sites and is continuing its attack.
2019-11-12 04:35:44
50.73.116.41 attack
Masscan Port Scanning Tool Detection
2019-11-12 04:25:34
82.165.138.167 attack
Detected By Fail2ban
2019-11-12 04:26:51
180.96.69.215 attackspam
2019-11-09 07:14:08 server sshd[37267]: Failed password for invalid user test from 180.96.69.215 port 40564 ssh2
2019-11-12 04:42:43
46.43.3.65 attack
Detected By Fail2ban
2019-11-12 04:27:47
80.82.77.227 attack
11/11/2019-13:26:27.128736 80.82.77.227 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-12 04:11:14
153.37.175.226 attackbots
RDP brute forcing (r)
2019-11-12 04:46:02
220.164.2.138 attack
'IP reached maximum auth failures for a one day block'
2019-11-12 04:22:26
222.186.190.2 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Failed password for root from 222.186.190.2 port 16094 ssh2
Failed password for root from 222.186.190.2 port 16094 ssh2
Failed password for root from 222.186.190.2 port 16094 ssh2
Failed password for root from 222.186.190.2 port 16094 ssh2
2019-11-12 04:17:37
138.197.95.2 attackspambots
WordPress wp-login brute force :: 138.197.95.2 0.140 BYPASS [11/Nov/2019:20:01:56  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-11-12 04:28:14

Recently Reported IPs

201.49.106.0 88.61.68.16 8.192.67.5 46.10.118.180
154.194.27.125 80.45.78.129 16.198.167.164 117.239.231.139
233.110.54.118 69.128.220.66 212.8.125.66 214.175.214.113
126.172.209.55 243.217.247.83 247.49.104.114 115.165.209.229
99.25.247.80 20.12.158.5 187.194.216.125 209.17.148.58