Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.81.21.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.81.21.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 07:33:16 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 7.21.81.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.21.81.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.253.167.10 attackbotsspam
238. On Jun 3 2020 experienced a Brute Force SSH login attempt -> 100 unique times by 206.253.167.10.
2020-06-04 06:41:57
198.108.67.35 attack
Honeypot attack, port: 139, PTR: worker-17.sfj.corp.censys.io.
2020-06-04 06:50:13
195.54.167.117 attackbots
Various injection attacks, parameters, SQL Injection
2020-06-04 06:50:41
51.140.30.107 attackbots
xxs
2020-06-04 06:17:53
124.11.81.189 attackbots
Honeypot attack, port: 81, PTR: 124-11-81-189.static.tfn.net.tw.
2020-06-04 06:36:29
129.226.114.97 attackspambots
Invalid user admin from 129.226.114.97 port 48094
2020-06-04 06:27:19
51.37.82.212 attack
Honeypot attack, port: 139, PTR: PTR record not found
2020-06-04 06:20:01
182.74.25.246 attack
SASL PLAIN auth failed: ruser=...
2020-06-04 06:15:50
119.44.217.242 attack
Automatic report - Banned IP Access
2020-06-04 06:47:22
5.182.39.62 attackspam
SSH Bruteforce on Honeypot
2020-06-04 06:40:01
61.62.145.58 attackspam
Honeypot attack, port: 445, PTR: 61-62-145-58-adsl-TPE.dynamic.so-net.net.tw.
2020-06-04 06:46:37
123.240.190.9 attackspambots
Honeypot attack, port: 81, PTR: 123-240-190-9.cctv.dynamic.tbcnet.net.tw.
2020-06-04 06:12:47
120.71.146.217 attack
Jun  3 16:07:30 server1 sshd\[16948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.217  user=root
Jun  3 16:07:32 server1 sshd\[16948\]: Failed password for root from 120.71.146.217 port 55988 ssh2
Jun  3 16:11:04 server1 sshd\[18020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.217  user=root
Jun  3 16:11:06 server1 sshd\[18020\]: Failed password for root from 120.71.146.217 port 54410 ssh2
Jun  3 16:14:42 server1 sshd\[19139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.146.217  user=root
...
2020-06-04 06:19:18
85.15.219.229 attackbots
SASL PLAIN auth failed: ruser=...
2020-06-04 06:26:54
37.49.226.126 attackbotsspam
ZTE Router Exploit Scanner
2020-06-04 06:51:36

Recently Reported IPs

76.157.123.222 4.52.25.173 66.125.149.81 84.223.86.91
107.196.50.61 205.212.157.48 172.188.92.203 72.176.27.24
231.101.95.236 245.87.174.142 239.135.169.129 68.248.129.112
189.239.184.209 80.122.243.190 3.188.184.137 192.98.158.76
75.197.134.202 75.121.117.70 41.169.163.10 59.22.164.88