Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.117.45.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.117.45.198.			IN	A

;; AUTHORITY SECTION:
.			477	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012300 1800 900 604800 86400

;; Query time: 123 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 23 22:03:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 198.45.117.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.45.117.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.186.0.9 attackspam
Invalid user username from 14.186.0.9 port 35714
2020-01-19 04:15:58
118.25.12.59 attackspambots
Unauthorized connection attempt detected from IP address 118.25.12.59 to port 2220 [J]
2020-01-19 03:55:51
106.13.144.102 attack
Unauthorized connection attempt detected from IP address 106.13.144.102 to port 2220 [J]
2020-01-19 04:00:40
139.155.151.50 attackbots
Unauthorized connection attempt detected from IP address 139.155.151.50 to port 2220 [J]
2020-01-19 03:51:44
182.61.14.161 attack
Unauthorized connection attempt detected from IP address 182.61.14.161 to port 2220 [J]
2020-01-19 03:47:10
46.17.97.30 attack
Invalid user wade from 46.17.97.30 port 48814
2020-01-19 04:12:07
106.54.17.235 attackbots
Jan 18 19:43:27 localhost sshd\[16393\]: Invalid user zf from 106.54.17.235
Jan 18 19:43:27 localhost sshd\[16393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.17.235
Jan 18 19:43:29 localhost sshd\[16393\]: Failed password for invalid user zf from 106.54.17.235 port 42472 ssh2
Jan 18 19:45:23 localhost sshd\[16554\]: Invalid user svn from 106.54.17.235
Jan 18 19:45:23 localhost sshd\[16554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.17.235
...
2020-01-19 03:59:35
113.190.141.187 attackspambots
Invalid user admin from 113.190.141.187 port 40009
2020-01-19 03:57:53
211.142.118.38 attackbots
Unauthorized connection attempt detected from IP address 211.142.118.38 to port 2220 [J]
2020-01-19 04:20:35
93.186.254.22 attack
Unauthorized connection attempt detected from IP address 93.186.254.22 to port 2220 [J]
2020-01-19 04:04:02
187.109.168.46 attackspam
Invalid user admin from 187.109.168.46 port 45361
2020-01-19 03:46:22
52.67.183.183 attackspambots
Invalid user file from 52.67.183.183 port 56398
2020-01-19 04:09:58
103.248.14.92 attackspambots
Invalid user zz from 103.248.14.92 port 26693
2020-01-19 04:03:00
61.216.17.26 attackbotsspam
Jan 18 16:18:01 firewall sshd[27123]: Invalid user ts3srv from 61.216.17.26
Jan 18 16:18:04 firewall sshd[27123]: Failed password for invalid user ts3srv from 61.216.17.26 port 19835 ssh2
Jan 18 16:21:02 firewall sshd[27263]: Invalid user insp from 61.216.17.26
...
2020-01-19 04:08:44
188.166.160.107 attack
Invalid user gilberto from 188.166.160.107 port 53706
2020-01-19 03:45:18

Recently Reported IPs

228.43.141.216 130.28.152.36 106.154.224.172 186.41.137.124
140.86.2.18 195.185.18.28 240.15.1.201 9.89.139.169
72.109.135.53 182.1.199.28 88.155.57.11 1.29.58.86
89.59.90.69 188.100.7.200 153.240.153.28 200.95.153.51
242.189.226.169 114.52.109.214 223.42.228.45 140.187.168.142