Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.164.214.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;184.164.214.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:38:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
21.214.164.184.in-addr.arpa domain name pointer ip-184-164-214-21.KRYPTCOLO.NET.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.214.164.184.in-addr.arpa	name = ip-184-164-214-21.KRYPTCOLO.NET.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
172.82.167.104 attackbots
xmlrpc.php attack
2019-12-27 05:24:00
190.115.179.13 attackbotsspam
Invalid user supervisor from 190.115.179.13 port 28025
2019-12-27 05:15:32
111.223.140.238 attackspam
Unauthorized connection attempt from IP address 111.223.140.238 on Port 445(SMB)
2019-12-27 05:29:18
42.119.212.93 attackspam
1577371604 - 12/26/2019 15:46:44 Host: 42.119.212.93/42.119.212.93 Port: 445 TCP Blocked
2019-12-27 05:39:57
171.236.68.45 attack
Unauthorized connection attempt from IP address 171.236.68.45 on Port 445(SMB)
2019-12-27 05:57:06
129.28.188.21 attack
Dec 26 20:42:02 game-panel sshd[864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.188.21
Dec 26 20:42:04 game-panel sshd[864]: Failed password for invalid user vince from 129.28.188.21 port 59678 ssh2
Dec 26 20:44:15 game-panel sshd[967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.188.21
2019-12-27 05:53:11
157.55.39.113 attack
Automatic report - Banned IP Access
2019-12-27 05:27:51
198.108.66.228 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 05:34:19
111.231.63.14 attackbotsspam
Automatic report - Banned IP Access
2019-12-27 05:56:40
45.117.82.166 attack
Thu Dec 26 16:47:35 2019 \[pid 27641\] \[elektron\] FTP response: Client "45.117.82.166", "530 Permission denied."
Thu Dec 26 16:47:38 2019 \[pid 27646\] \[elektron.lv\] FTP response: Client "45.117.82.166", "530 Permission denied."
Thu Dec 26 16:47:41 2019 \[pid 27648\] \[elektron\] FTP response: Client "45.117.82.166", "530 Permission denied."
2019-12-27 05:35:59
118.143.198.3 attackspam
invalid user
2019-12-27 05:31:11
106.38.10.44 attack
Unauthorized connection attempt from IP address 106.38.10.44 on Port 445(SMB)
2019-12-27 05:54:17
186.93.42.173 attackbots
Unauthorized connection attempt from IP address 186.93.42.173 on Port 445(SMB)
2019-12-27 05:51:52
198.108.66.25 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 05:26:55
45.136.108.128 attackbots
Port scan on 14 port(s): 34 420 970 5222 14725 19495 19522 24546 25251 32425 38384 41411 42627 60601
2019-12-27 05:42:56

Recently Reported IPs

70.239.120.95 197.156.12.206 34.227.95.147 208.215.234.234
197.171.192.132 18.112.117.61 143.30.26.84 154.38.95.61
187.85.221.207 153.162.38.153 49.60.60.239 204.65.46.205
35.24.195.34 247.242.198.129 76.238.79.254 106.202.32.131
3.116.75.77 90.153.157.37 142.102.63.129 93.122.206.214