Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.21.245.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.21.245.234.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:49:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 234.245.21.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.245.21.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.233.57 attackspam
Invalid user gopher from 128.199.233.57 port 55737
2019-07-28 03:49:04
213.61.202.153 attackspam
Invalid user angelo from 213.61.202.153 port 45238
2019-07-28 03:33:05
91.117.129.100 attackspambots
Jul 27 21:01:29 * sshd[17654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.117.129.100
Jul 27 21:01:31 * sshd[17654]: Failed password for invalid user test from 91.117.129.100 port 56895 ssh2
2019-07-28 03:25:48
185.220.101.69 attackspambots
Jul 27 20:04:26 vtv3 sshd\[2781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.69  user=root
Jul 27 20:04:28 vtv3 sshd\[2781\]: Failed password for root from 185.220.101.69 port 46555 ssh2
Jul 27 20:04:31 vtv3 sshd\[2781\]: Failed password for root from 185.220.101.69 port 46555 ssh2
Jul 27 20:04:33 vtv3 sshd\[2781\]: Failed password for root from 185.220.101.69 port 46555 ssh2
Jul 27 20:04:35 vtv3 sshd\[2781\]: Failed password for root from 185.220.101.69 port 46555 ssh2
Jul 27 20:38:05 vtv3 sshd\[19692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.69  user=root
Jul 27 20:38:08 vtv3 sshd\[19692\]: Failed password for root from 185.220.101.69 port 41509 ssh2
Jul 27 20:38:10 vtv3 sshd\[19692\]: Failed password for root from 185.220.101.69 port 41509 ssh2
Jul 27 20:38:13 vtv3 sshd\[19692\]: Failed password for root from 185.220.101.69 port 41509 ssh2
Jul 27 20:38:15 vtv3 sshd\[19692\]: Failed p
2019-07-28 03:38:45
117.245.75.160 attack
Invalid user admin from 117.245.75.160 port 41456
2019-07-28 03:22:28
103.94.130.4 attack
Jul 27 21:20:19 ubuntu-2gb-nbg1-dc3-1 sshd[32518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.130.4
Jul 27 21:20:21 ubuntu-2gb-nbg1-dc3-1 sshd[32518]: Failed password for invalid user ftpuser from 103.94.130.4 port 54098 ssh2
...
2019-07-28 03:54:52
120.92.20.197 attackbotsspam
Invalid user humanity from 120.92.20.197 port 39443
2019-07-28 03:51:17
117.1.117.114 attackspam
Invalid user admin from 117.1.117.114 port 47615
2019-07-28 03:52:08
156.212.108.81 attackbotsspam
Invalid user admin from 156.212.108.81 port 47474
2019-07-28 03:44:44
206.189.24.75 attack
[Aegis] @ 2019-07-27 19:53:56  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-07-28 03:34:03
183.89.212.184 attackbots
Invalid user nagesh from 183.89.212.184 port 57346
2019-07-28 03:39:12
201.249.136.66 attackbotsspam
Invalid user om from 201.249.136.66 port 31277
2019-07-28 03:35:56
125.160.64.144 attackspam
Invalid user ubnt from 125.160.64.144 port 27311
2019-07-28 03:50:03
104.248.8.60 attack
Jul 27 22:48:21 server2 sshd\[4800\]: User root from 104.248.8.60 not allowed because not listed in AllowUsers
Jul 27 22:48:21 server2 sshd\[4804\]: Invalid user admin from 104.248.8.60
Jul 27 22:48:22 server2 sshd\[4806\]: Invalid user admin from 104.248.8.60
Jul 27 22:48:23 server2 sshd\[4808\]: Invalid user user from 104.248.8.60
Jul 27 22:48:24 server2 sshd\[4812\]: Invalid user ubnt from 104.248.8.60
Jul 27 22:48:25 server2 sshd\[4814\]: Invalid user admin from 104.248.8.60
2019-07-28 03:53:50
165.22.205.32 attackbots
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-28 03:17:39

Recently Reported IPs

240.110.116.184 132.109.116.237 116.74.22.201 141.191.241.241
35.33.137.187 252.99.16.63 130.52.213.214 69.139.195.99
53.26.109.196 229.110.225.121 31.224.87.206 236.41.243.171
228.10.112.18 66.81.210.72 161.90.41.24 241.66.55.225
227.194.70.42 148.200.54.51 28.15.111.48 4.175.57.178