Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.103.189.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.103.189.214.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:02:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 214.189.103.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.189.103.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.140.20.234 attackbotsspam
3389BruteforceFW22
2019-06-30 16:28:14
95.216.20.54 attackbots
20 attempts against mh-misbehave-ban on milky.magehost.pro
2019-06-30 16:10:20
159.65.245.203 attackspambots
$f2bV_matches
2019-06-30 16:38:03
138.99.216.65 attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-30 16:25:04
110.45.145.178 attack
$f2bV_matches
2019-06-30 16:32:42
94.21.75.55 attackbotsspam
Jun 27 02:16:37 mail sshd[1883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-75-55.pool.digikabel.hu
Jun 27 02:16:39 mail sshd[1883]: Failed password for invalid user cisco from 94.21.75.55 port 42397 ssh2
Jun 27 02:16:39 mail sshd[1883]: Received disconnect from 94.21.75.55: 11: Bye Bye [preauth]
Jun 27 02:19:54 mail sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-21-75-55.pool.digikabel.hu


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.21.75.55
2019-06-30 15:49:17
104.128.69.146 attackspambots
Jun 30 06:31:59 cvbmail sshd\[16096\]: Invalid user jn from 104.128.69.146
Jun 30 06:31:59 cvbmail sshd\[16096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
Jun 30 06:32:01 cvbmail sshd\[16096\]: Failed password for invalid user jn from 104.128.69.146 port 56028 ssh2
2019-06-30 16:22:19
42.56.154.146 attackspambots
60001/tcp
[2019-06-30]1pkt
2019-06-30 16:00:48
60.12.18.6 attackbots
firewall-block, port(s): 8181/tcp
2019-06-30 16:34:50
173.12.26.97 attackbots
RDP Scan
2019-06-30 15:55:09
146.115.62.55 attackbotsspam
Invalid user chimistry from 146.115.62.55 port 32902
2019-06-30 16:08:35
182.72.104.106 attackspam
Jun 30 08:42:28 MK-Soft-Root2 sshd\[2789\]: Invalid user openproject from 182.72.104.106 port 43966
Jun 30 08:42:28 MK-Soft-Root2 sshd\[2789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.104.106
Jun 30 08:42:30 MK-Soft-Root2 sshd\[2789\]: Failed password for invalid user openproject from 182.72.104.106 port 43966 ssh2
...
2019-06-30 15:56:19
218.164.18.253 attackspambots
37215/tcp
[2019-06-30]1pkt
2019-06-30 16:06:22
69.60.21.172 attackbots
2019-06-30T05:04:35.415294abusebot-8.cloudsearch.cf sshd\[390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.60.21.172  user=root
2019-06-30 16:12:14
84.22.61.218 attackspambots
firewall-block, port(s): 445/tcp
2019-06-30 16:33:53

Recently Reported IPs

14.96.9.242 247.120.176.167 175.39.246.6 157.57.92.118
185.235.94.160 96.11.161.29 50.232.183.69 255.22.132.187
25.14.85.8 135.118.224.185 99.250.208.23 124.12.221.144
198.144.218.63 122.28.25.74 24.244.247.35 240.200.39.244
139.143.122.145 34.5.179.5 76.120.161.212 168.79.178.75