Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.146.68.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.146.68.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:42:18 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 221.68.146.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.68.146.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.34.233.6 attack
Unauthorized connection attempt from IP address 212.34.233.6 on Port 445(SMB)
2020-02-26 10:39:09
92.63.194.91 attackbots
slow and persistent scanner
2020-02-26 10:10:16
171.247.177.85 attackbotsspam
[portscan] Port scan
2020-02-26 10:20:22
115.79.125.154 attack
Port probing on unauthorized port 23
2020-02-26 10:33:35
108.210.130.113 attackbots
Shenzhen TVT DVR Remote Code Execution Vulnerability
2020-02-26 10:28:36
88.34.126.169 attackbotsspam
Linear eMerge E3 Unauthenticated Command Injection Remote Root Exploit Vulnerability
2020-02-26 10:25:33
113.161.198.48 attackspambots
Unauthorized connection attempt from IP address 113.161.198.48 on Port 445(SMB)
2020-02-26 10:25:18
74.82.47.24 attack
Honeypot hit.
2020-02-26 10:44:54
185.2.4.27 attack
GET /wp/wp-admin/ 404
2020-02-26 10:43:51
80.53.245.245 attack
Repeated RDP login failures. Last user: Postgres
2020-02-26 10:43:21
216.158.233.138 attack
02/26/2020-03:08:56.035075 216.158.233.138 Protocol: 17 ET SCAN Sipvicious Scan
2020-02-26 10:19:12
222.186.30.248 attack
v+ssh-bruteforce
2020-02-26 10:07:12
14.98.200.167 attackbotsspam
2020-02-26T03:00:08.0101671240 sshd\[28585\]: Invalid user glassfish from 14.98.200.167 port 41268
2020-02-26T03:00:08.0128211240 sshd\[28585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.200.167
2020-02-26T03:00:10.2399801240 sshd\[28585\]: Failed password for invalid user glassfish from 14.98.200.167 port 41268 ssh2
...
2020-02-26 10:16:04
20.36.40.112 attackspam
Feb 26 04:02:32 www sshd\[62119\]: Invalid user koulutusrekisteri from 20.36.40.112
Feb 26 04:02:32 www sshd\[62119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.36.40.112
Feb 26 04:02:35 www sshd\[62119\]: Failed password for invalid user koulutusrekisteri from 20.36.40.112 port 58868 ssh2
...
2020-02-26 10:11:39
121.52.150.220 attackspambots
PK_APNIC-HM_<177>1582677940 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 121.52.150.220:55630
2020-02-26 10:09:02

Recently Reported IPs

197.106.73.74 193.49.37.90 210.163.181.210 152.29.247.47
85.136.118.175 231.157.88.15 54.206.145.190 127.20.231.88
85.107.86.143 94.80.171.174 142.105.169.151 8.89.2.7
119.172.148.167 20.27.25.92 59.158.55.232 228.41.130.13
32.150.12.115 117.102.128.85 128.34.237.44 188.173.220.99