Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.137.16.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.137.16.44.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:08:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 44.16.137.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.16.137.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.167.141 attackbotsspam
88 packets to ports 2013 2061 2100 2103 2169 2239 2301 2305 2382 2464 2499 2548 2631 2764 2893 2901 2913 2918 2947 2965 3028 3037 3065 3088 3091 3138 3175 3211 3261 3289 3438 3499 3545 3550 3583 3595 3606 3612 3689 3701 3757 3759 3766 3775 3792 3874 3883 3887, etc.
2020-06-08 16:12:41
117.4.13.174 attackbotsspam
firewall-block, port(s): 445/tcp
2020-06-08 16:06:39
61.246.7.145 attackspam
Jun  8 10:56:59 lukav-desktop sshd\[23935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145  user=root
Jun  8 10:57:02 lukav-desktop sshd\[23935\]: Failed password for root from 61.246.7.145 port 47050 ssh2
Jun  8 11:01:46 lukav-desktop sshd\[24065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145  user=root
Jun  8 11:01:48 lukav-desktop sshd\[24065\]: Failed password for root from 61.246.7.145 port 49405 ssh2
Jun  8 11:03:51 lukav-desktop sshd\[24095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145  user=root
2020-06-08 16:05:51
106.12.70.118 attack
$f2bV_matches
2020-06-08 16:07:01
180.241.44.203 attackspam
SSH Brute Force
2020-06-08 15:45:34
155.94.140.178 attackspambots
Jun  8 08:41:27 hosting sshd[2052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.140.178  user=root
Jun  8 08:41:29 hosting sshd[2052]: Failed password for root from 155.94.140.178 port 60206 ssh2
...
2020-06-08 16:03:21
103.253.42.59 attackspam
[2020-06-08 03:33:30] NOTICE[1288][C-00001907] chan_sip.c: Call from '' (103.253.42.59:52854) to extension '801146423112910' rejected because extension not found in context 'public'.
[2020-06-08 03:33:30] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-08T03:33:30.177-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146423112910",SessionID="0x7f4d7455fd68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/52854",ACLName="no_extension_match"
[2020-06-08 03:34:06] NOTICE[1288][C-00001908] chan_sip.c: Call from '' (103.253.42.59:51278) to extension '46423112910' rejected because extension not found in context 'public'.
[2020-06-08 03:34:06] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-08T03:34:06.309-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46423112910",SessionID="0x7f4d7455fd68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.
...
2020-06-08 15:47:08
190.229.15.254 attackbots
Jun  8 07:49:34 ns382633 sshd\[4343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.229.15.254  user=root
Jun  8 07:49:36 ns382633 sshd\[4343\]: Failed password for root from 190.229.15.254 port 46363 ssh2
Jun  8 07:59:43 ns382633 sshd\[6069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.229.15.254  user=root
Jun  8 07:59:45 ns382633 sshd\[6069\]: Failed password for root from 190.229.15.254 port 42627 ssh2
Jun  8 08:04:53 ns382633 sshd\[6997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.229.15.254  user=root
2020-06-08 16:00:08
172.104.72.116 attack
ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic
2020-06-08 16:05:20
36.66.208.121 attackspam
firewall-block, port(s): 445/tcp
2020-06-08 16:23:59
190.115.80.11 attackspam
$f2bV_matches
2020-06-08 16:09:19
222.186.175.182 attackspambots
Jun  8 04:51:14 firewall sshd[14788]: Failed password for root from 222.186.175.182 port 40746 ssh2
Jun  8 04:51:18 firewall sshd[14788]: Failed password for root from 222.186.175.182 port 40746 ssh2
Jun  8 04:51:21 firewall sshd[14788]: Failed password for root from 222.186.175.182 port 40746 ssh2
...
2020-06-08 15:58:57
36.79.253.45 attackbotsspam
firewall-block, port(s): 445/tcp
2020-06-08 16:20:47
104.236.38.182 attackspambots
2020-06-08T00:42:45.081300suse-nuc sshd[18223]: User root from 104.236.38.182 not allowed because listed in DenyUsers
...
2020-06-08 16:18:55
39.155.221.190 attackbotsspam
Jun  8 06:41:02 lnxweb62 sshd[1042]: Failed password for root from 39.155.221.190 port 36214 ssh2
Jun  8 06:41:02 lnxweb62 sshd[1042]: Failed password for root from 39.155.221.190 port 36214 ssh2
2020-06-08 16:06:19

Recently Reported IPs

194.252.90.120 145.133.40.90 159.164.43.219 120.1.112.84
57.172.201.105 77.30.83.190 4.54.239.135 75.76.121.39
118.234.218.212 56.83.6.198 153.6.146.18 8.165.99.45
24.180.113.130 87.215.36.40 24.130.224.234 28.84.81.254
129.69.190.164 38.148.25.183 240.96.10.9 232.159.69.147