Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Valencia

Region: Comunidad Valenciana

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.245.54.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.245.54.21.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101002 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 17:20:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 21.54.245.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.54.245.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.89.162.118 attackspam
Oct 15 23:57:44 xtremcommunity sshd\[562447\]: Invalid user chef from 159.89.162.118 port 47104
Oct 15 23:57:44 xtremcommunity sshd\[562447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
Oct 15 23:57:46 xtremcommunity sshd\[562447\]: Failed password for invalid user chef from 159.89.162.118 port 47104 ssh2
Oct 16 00:02:06 xtremcommunity sshd\[562538\]: Invalid user serf from 159.89.162.118 port 56056
Oct 16 00:02:06 xtremcommunity sshd\[562538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.162.118
...
2019-10-16 14:41:14
91.195.122.91 attackbotsspam
Oct 16 07:29:12 MK-Soft-VM3 sshd[15111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.195.122.91 
Oct 16 07:29:14 MK-Soft-VM3 sshd[15111]: Failed password for invalid user 123456 from 91.195.122.91 port 57119 ssh2
...
2019-10-16 14:29:54
41.207.182.133 attackbotsspam
Oct 15 20:21:04 sachi sshd\[11757\]: Invalid user jbr from 41.207.182.133
Oct 15 20:21:04 sachi sshd\[11757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.182.133
Oct 15 20:21:07 sachi sshd\[11757\]: Failed password for invalid user jbr from 41.207.182.133 port 45848 ssh2
Oct 15 20:25:39 sachi sshd\[12141\]: Invalid user 123456 from 41.207.182.133
Oct 15 20:25:39 sachi sshd\[12141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.182.133
2019-10-16 14:45:29
51.68.251.201 attackbotsspam
Oct 16 08:10:56 vps691689 sshd[26618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.251.201
Oct 16 08:10:58 vps691689 sshd[26618]: Failed password for invalid user Hobbit from 51.68.251.201 port 57818 ssh2
...
2019-10-16 14:20:46
120.234.134.141 attackbotsspam
Automatic report - Port Scan
2019-10-16 14:55:49
222.186.173.201 attackbots
10/16/2019-02:30:49.453120 222.186.173.201 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-16 14:38:39
42.247.22.65 attackspambots
Oct 16 06:36:20 SilenceServices sshd[32711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.247.22.65
Oct 16 06:36:22 SilenceServices sshd[32711]: Failed password for invalid user ok123456 from 42.247.22.65 port 53223 ssh2
Oct 16 06:41:10 SilenceServices sshd[1638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.247.22.65
2019-10-16 14:54:10
60.30.92.74 attackbots
2019-10-16T06:16:30.139809abusebot-5.cloudsearch.cf sshd\[17333\]: Invalid user fuckyou from 60.30.92.74 port 6693
2019-10-16 14:21:34
78.186.196.192 attack
Automatic report - Port Scan Attack
2019-10-16 14:46:19
47.254.216.89 attackbots
Oct 16 04:00:38 localhost sshd\[7376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.216.89  user=root
Oct 16 04:00:40 localhost sshd\[7376\]: Failed password for root from 47.254.216.89 port 47146 ssh2
Oct 16 04:27:49 localhost sshd\[7511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.216.89  user=root
Oct 16 04:27:51 localhost sshd\[7511\]: Failed password for root from 47.254.216.89 port 49356 ssh2
2019-10-16 14:51:46
124.158.164.146 attackbotsspam
Oct 15 09:23:22 h2065291 sshd[30502]: Invalid user user1 from 124.158.164.146
Oct 15 09:23:22 h2065291 sshd[30502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.164.146 
Oct 15 09:23:24 h2065291 sshd[30502]: Failed password for invalid user user1 from 124.158.164.146 port 54248 ssh2
Oct 15 09:23:24 h2065291 sshd[30502]: Received disconnect from 124.158.164.146: 11: Bye Bye [preauth]
Oct 15 09:39:06 h2065291 sshd[30620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.158.164.146  user=r.r
Oct 15 09:39:09 h2065291 sshd[30620]: Failed password for r.r from 124.158.164.146 port 36818 ssh2
Oct 15 09:39:09 h2065291 sshd[30620]: Received disconnect from 124.158.164.146: 11: Bye Bye [preauth]
Oct 15 09:43:36 h2065291 sshd[30652]: Invalid user test from 124.158.164.146
Oct 15 09:43:36 h2065291 sshd[30652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
-------------------------------
2019-10-16 14:36:35
182.72.139.6 attackbots
Oct 16 07:00:54 microserver sshd[789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.139.6  user=root
Oct 16 07:00:56 microserver sshd[789]: Failed password for root from 182.72.139.6 port 45066 ssh2
Oct 16 07:05:20 microserver sshd[1467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.139.6  user=root
Oct 16 07:05:22 microserver sshd[1467]: Failed password for root from 182.72.139.6 port 55794 ssh2
Oct 16 07:09:50 microserver sshd[1769]: Invalid user sekar from 182.72.139.6 port 38296
Oct 16 07:23:12 microserver sshd[3761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.139.6  user=root
Oct 16 07:23:14 microserver sshd[3761]: Failed password for root from 182.72.139.6 port 42290 ssh2
Oct 16 07:27:44 microserver sshd[4416]: Invalid user benny from 182.72.139.6 port 53028
Oct 16 07:27:44 microserver sshd[4416]: pam_unix(sshd:auth): authentication failure; logname= uid
2019-10-16 14:52:00
45.237.140.120 attackbotsspam
Oct 16 06:19:31 game-panel sshd[15653]: Failed password for root from 45.237.140.120 port 40445 ssh2
Oct 16 06:24:23 game-panel sshd[15787]: Failed password for root from 45.237.140.120 port 41223 ssh2
2019-10-16 14:33:24
206.189.119.73 attack
Invalid user ftpuser from 206.189.119.73 port 51910
2019-10-16 14:56:24
2600:380:9a56:aed1:5124:afd4:ee5b:5600 attackspam
cell phone with email hacking
2019-10-16 14:26:16

Recently Reported IPs

165.22.245.238 184.139.80.54 196.196.53.41 192.241.110.158
195.87.250.58 200.148.221.103 51.79.249.30 59.147.243.85
190.196.165.186 175.140.104.130 27.47.88.50 49.234.9.109
194.195.118.139 45.124.84.249 50.63.165.22 37.98.158.103
138.68.108.44 68.68.130.213 154.104.200.212 46.181.211.21