Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.180.127.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.180.127.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:32:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 144.127.180.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.127.180.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.230.226.124 attack
"Unauthorized connection attempt on SSHD detected"
2020-09-28 14:20:50
45.6.63.64 attackbots
Brute force SMTP login attempted.
...
2020-09-28 14:12:46
91.134.13.250 attackbots
2020-09-28T07:25:50.924771mail.broermann.family sshd[10677]: Failed password for invalid user christian from 91.134.13.250 port 33784 ssh2
2020-09-28T07:29:13.365435mail.broermann.family sshd[10966]: Invalid user spider from 91.134.13.250 port 42186
2020-09-28T07:29:13.368569mail.broermann.family sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.13.250
2020-09-28T07:29:13.365435mail.broermann.family sshd[10966]: Invalid user spider from 91.134.13.250 port 42186
2020-09-28T07:29:15.405401mail.broermann.family sshd[10966]: Failed password for invalid user spider from 91.134.13.250 port 42186 ssh2
...
2020-09-28 14:30:36
104.248.147.20 attackspam
SSH-BruteForce
2020-09-28 14:06:50
180.76.174.39 attackspam
" "
2020-09-28 14:32:49
107.172.43.217 attackbotsspam
Automatic report - Banned IP Access
2020-09-28 14:03:42
138.68.238.242 attack
Sep 27 22:21:33 er4gw sshd[6566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.238.242
2020-09-28 14:17:26
106.12.110.157 attack
Invalid user git from 106.12.110.157 port 59289
2020-09-28 14:21:44
181.55.95.52 attack
20 attempts against mh-ssh on soil
2020-09-28 14:17:42
121.48.165.121 attackbotsspam
2020-09-28T05:45:01.669158vps1033 sshd[15950]: Invalid user SSH-2.0-OpenSSH_6.7p1 from 121.48.165.121 port 43006
2020-09-28T05:45:01.673938vps1033 sshd[15950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.48.165.121
2020-09-28T05:45:01.669158vps1033 sshd[15950]: Invalid user SSH-2.0-OpenSSH_6.7p1 from 121.48.165.121 port 43006
2020-09-28T05:45:03.855150vps1033 sshd[15950]: Failed password for invalid user SSH-2.0-OpenSSH_6.7p1 from 121.48.165.121 port 43006 ssh2
2020-09-28T05:48:32.093431vps1033 sshd[23430]: Invalid user ftpuser from 121.48.165.121 port 59216
...
2020-09-28 14:32:11
46.102.13.147 attackspam
Automatic report - Port Scan Attack
2020-09-28 14:22:12
111.229.48.141 attack
$f2bV_matches
2020-09-28 13:56:58
95.217.234.23 attack
Invalid user ftp1 from 95.217.234.23 port 25208
2020-09-28 14:24:47
51.158.70.82 attackspam
Fail2Ban Ban Triggered (2)
2020-09-28 14:26:01
150.109.52.213 attack
srv02 Mass scanning activity detected Target: 22464  ..
2020-09-28 13:59:20

Recently Reported IPs

86.76.217.184 91.48.102.191 237.122.236.28 28.47.230.56
77.72.111.152 93.125.82.37 12.140.153.74 9.124.127.135
48.148.76.121 127.110.42.255 184.213.182.247 191.144.165.75
71.224.32.91 2.164.42.250 218.61.132.64 36.141.179.47
5.101.158.79 205.102.59.166 187.1.123.72 21.137.54.182