Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.1.100.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.1.100.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 20:56:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 107.100.1.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.100.1.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.239.186.93 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-21 22:50:22
62.210.131.80 attackspam
Nov 21 11:52:44 marvibiene sshd[32975]: Invalid user giccom from 62.210.131.80 port 8496
Nov 21 11:52:44 marvibiene sshd[32975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.131.80
Nov 21 11:52:44 marvibiene sshd[32975]: Invalid user giccom from 62.210.131.80 port 8496
Nov 21 11:52:46 marvibiene sshd[32975]: Failed password for invalid user giccom from 62.210.131.80 port 8496 ssh2
...
2019-11-21 22:44:58
45.82.153.77 attackbotsspam
Nov 21 15:58:38 relay postfix/smtpd\[17136\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 16:05:50 relay postfix/smtpd\[17136\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 16:06:14 relay postfix/smtpd\[22562\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 16:09:57 relay postfix/smtpd\[15848\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 21 16:10:17 relay postfix/smtpd\[22562\]: warning: unknown\[45.82.153.77\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-21 23:13:16
159.65.62.216 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-11-21 23:06:22
149.202.81.101 attackbots
ENG,WP GET /wp-login.php
2019-11-21 22:34:07
209.251.20.139 attackspam
(From ryanc@pjnmail.com) I came across your website (https://www.wittnerchiro.com/page/contact.html) and just wanted to reach
out to see if you're hiring? 

If so, I'd like to extend an offer to post to top job sites at
no cost for two weeks. 

Here are some of the key benefits: 

-- Post to top job sites with one click 
-- Manage all candidates in one place 
-- No cost for two weeks 

You can post your job openings now by going to our website below: 

>> http://www.TryProJob.com

* Please use offer code 987FREE -- Expires Soon * 

Thanks for your time, 
Ryan C. 

Pro Job Network 
10451 Twin Rivers Rd #279 
Columbia, MD 21044 

To OPT OUT, please email ryanc@pjnmail.com
with "REMOVE wittnerchiro.com" in the subject line.
2019-11-21 22:52:50
150.95.52.111 attack
Wordpress Admin Login attack
2019-11-21 22:41:00
216.218.206.76 attackbots
" "
2019-11-21 23:12:59
88.10.23.36 attackspam
Automatic report - Port Scan Attack
2019-11-21 23:01:42
31.129.179.137 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 22:46:29
112.220.85.26 attackbots
Nov 21 15:56:41 MK-Soft-VM6 sshd[30603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.85.26 
Nov 21 15:56:43 MK-Soft-VM6 sshd[30603]: Failed password for invalid user philippine from 112.220.85.26 port 46686 ssh2
...
2019-11-21 23:00:14
202.230.143.53 attackbots
Nov 21 20:26:37 areeb-Workstation sshd[6703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.230.143.53
Nov 21 20:26:39 areeb-Workstation sshd[6703]: Failed password for invalid user bassin from 202.230.143.53 port 57600 ssh2
...
2019-11-21 23:04:10
103.27.239.185 attackbotsspam
A portscan was detected. Details about the event:

Time.............: 2019-11-21 07:18:52

Source IP address: 103.27.239.185
2019-11-21 22:43:43
74.221.221.2 attack
2019-11-21T14:56:41Z - RDP login failed multiple times. (74.221.221.2)
2019-11-21 23:03:38
46.201.90.233 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-21 22:41:53

Recently Reported IPs

23.210.90.5 170.125.200.79 149.44.65.107 163.66.86.232
35.84.53.62 187.184.93.180 224.179.141.210 250.201.18.112
41.9.129.37 22.44.143.163 255.106.236.171 155.6.209.151
128.39.173.245 65.191.126.39 119.240.13.248 6.15.238.88
90.125.247.250 44.108.246.86 140.73.156.17 57.237.193.123