Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Claro

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.247.21.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7693
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.247.21.130.			IN	A

;; AUTHORITY SECTION:
.			569	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120901 1800 900 604800 86400

;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 03:56:33 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 130.21.247.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.21.247.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.76.231.106 attackbots
[portscan] Port scan
2019-08-05 15:28:16
216.151.183.55 attackspam
WordPress login attempts
2019-08-05 15:10:33
117.0.197.25 attackbots
port 23 attempt blocked
2019-08-05 14:58:23
51.68.95.99 attack
Aug  5 03:06:42 TORMINT sshd\[8316\]: Invalid user karen from 51.68.95.99
Aug  5 03:06:42 TORMINT sshd\[8316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.95.99
Aug  5 03:06:43 TORMINT sshd\[8316\]: Failed password for invalid user karen from 51.68.95.99 port 53164 ssh2
...
2019-08-05 15:11:04
119.183.53.125 attackbotsspam
port 23 attempt blocked
2019-08-05 14:50:44
40.77.167.84 attackspam
HTTP/80/443 Probe, Hack -
2019-08-05 14:53:39
92.154.119.223 attackbots
Aug  5 08:36:16 vpn01 sshd\[19737\]: Invalid user cp from 92.154.119.223
Aug  5 08:36:16 vpn01 sshd\[19737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.154.119.223
Aug  5 08:36:18 vpn01 sshd\[19737\]: Failed password for invalid user cp from 92.154.119.223 port 42168 ssh2
2019-08-05 15:19:16
49.234.3.197 attack
Aug  5 08:37:07 localhost sshd\[15866\]: Invalid user ftp from 49.234.3.197 port 34270
Aug  5 08:37:07 localhost sshd\[15866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.3.197
Aug  5 08:37:09 localhost sshd\[15866\]: Failed password for invalid user ftp from 49.234.3.197 port 34270 ssh2
2019-08-05 14:50:22
60.170.203.47 attackbots
port 23 attempt blocked
2019-08-05 15:38:17
185.143.221.7 attackbots
Attempted to connect to port 8080
2019-08-05 14:51:02
79.137.33.20 attack
SSH Brute-Force reported by Fail2Ban
2019-08-05 15:31:20
92.63.194.53 attack
Portscan or hack attempt detected by psad/fwsnort
WinRDP password Brute-Force
2019-08-05 15:24:39
178.128.108.96 attackbotsspam
2019-08-05T06:36:57.308177abusebot-7.cloudsearch.cf sshd\[24833\]: Invalid user password from 178.128.108.96 port 52056
2019-08-05 14:57:17
87.101.141.110 attackbotsspam
port 23 attempt blocked
2019-08-05 15:24:09
129.204.123.216 attack
2019-08-05T07:16:51.818230abusebot.cloudsearch.cf sshd\[32537\]: Invalid user tillid from 129.204.123.216 port 55174
2019-08-05 15:26:19

Recently Reported IPs

176.159.45.142 201.156.38.190 174.142.17.114 92.4.241.15
126.121.42.215 128.234.1.209 24.29.61.12 52.152.120.167
52.156.159.86 91.46.129.8 49.145.233.249 85.242.200.246
199.0.71.46 5.36.108.64 181.225.222.218 137.119.100.232
90.152.126.42 175.191.33.44 88.14.243.241 45.47.33.13