Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       21.0.0.0 - 21.255.255.255
CIDR:           21.0.0.0/8
NetName:        DNIC-SNET-021
NetHandle:      NET-21-0-0-0-1
Parent:          ()
NetType:        Direct Allocation
OriginAS:       
Organization:   United States Department of Defense (DoD) (USDDD)
RegDate:        1991-07-01
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/21.0.0.0



OrgName:        United States Department of Defense (DoD)
OrgId:          USDDD
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        2007-01-12
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/USDDD


OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgAbuseHandle: MIL-HSTMST-ARIN
OrgAbuseName:   Network DoD
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

OrgNOCHandle: MIL-HSTMST-ARIN
OrgNOCName:   Network DoD
OrgNOCPhone:  +1-844-347-2457 
OrgNOCEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgNOCRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end


# start

NetRange:       21.0.0.0 - 21.255.255.255
CIDR:           21.0.0.0/8
NetName:        DNIC-SNET-021
NetHandle:      NET-21-0-0-0-2
Parent:         DNIC-SNET-021 (NET-21-0-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   DoD Network Information Center (DNIC)
RegDate:        2025-09-05
Updated:        2025-09-05
Ref:            https://rdap.arin.net/registry/ip/21.0.0.0


OrgName:        DoD Network Information Center
OrgId:          DNIC
Address:        3990 E. Broad Street
City:           Columbus
StateProv:      OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2025-03-13
Ref:            https://rdap.arin.net/registry/entity/DNIC


OrgTechHandle: REGIS10-ARIN
OrgTechName:   Registration
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName:   Registration
OrgAbusePhone:  +1-844-347-2457 
OrgAbuseEmail:  disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://rdap.arin.net/registry/entity/REGIS10-ARIN

OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName:   Network DoD
OrgTechPhone:  +1-844-347-2457 
OrgTechEmail:  disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://rdap.arin.net/registry/entity/MIL-HSTMST-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.203.8.184
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.203.8.184.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 12:16:48 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 184.8.203.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 184.8.203.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.214.26.97 attackspambots
SSH login attempts.
2020-03-20 13:51:59
198.46.205.89 attackspam
SSH login attempts.
2020-03-20 14:09:22
115.186.188.53 attackspambots
Invalid user juan from 115.186.188.53 port 56380
2020-03-20 14:08:48
217.23.194.27 attackbotsspam
SSH login attempts.
2020-03-20 14:25:07
142.93.133.83 attackspam
SSH login attempts.
2020-03-20 14:11:10
5.188.86.207 attackspam
SSH login attempts.
2020-03-20 14:31:30
5.188.87.58 attack
SSH login attempts.
2020-03-20 14:17:00
46.59.16.30 attackspam
20 attempts against mh-ssh on cloud
2020-03-20 13:58:25
222.112.107.46 attackspambots
Mar 20 07:00:07 debian-2gb-nbg1-2 kernel: \[6943110.735578\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=222.112.107.46 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=14658 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-20 14:05:38
64.225.24.239 attack
Mar 19 20:07:53 php1 sshd\[25866\]: Invalid user laohua from 64.225.24.239
Mar 19 20:07:53 php1 sshd\[25866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.24.239
Mar 19 20:07:54 php1 sshd\[25866\]: Failed password for invalid user laohua from 64.225.24.239 port 43926 ssh2
Mar 19 20:12:30 php1 sshd\[26305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.24.239  user=root
Mar 19 20:12:32 php1 sshd\[26305\]: Failed password for root from 64.225.24.239 port 36800 ssh2
2020-03-20 14:26:21
45.141.156.203 attackspambots
SSH login attempts.
2020-03-20 14:07:04
51.159.28.87 attackspambots
Invalid user user100 from 51.159.28.87 port 44286
2020-03-20 14:22:36
173.235.122.54 attackspambots
Brute forcing email accounts
2020-03-20 14:10:46
201.249.169.210 attack
20 attempts against mh-ssh on cloud
2020-03-20 13:59:37
173.249.57.253 attackbots
Mar 20 03:58:48 vlre-nyc-1 sshd\[11221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.57.253  user=root
Mar 20 03:58:50 vlre-nyc-1 sshd\[11221\]: Failed password for root from 173.249.57.253 port 36396 ssh2
Mar 20 03:58:53 vlre-nyc-1 sshd\[11221\]: Failed password for root from 173.249.57.253 port 36396 ssh2
Mar 20 03:59:00 vlre-nyc-1 sshd\[11221\]: Failed password for root from 173.249.57.253 port 36396 ssh2
Mar 20 03:59:02 vlre-nyc-1 sshd\[11221\]: Failed password for root from 173.249.57.253 port 36396 ssh2
...
2020-03-20 14:02:25

Recently Reported IPs

38.174.115.117 134.209.22.96 116.56.161.14 54.72.126.190
35.203.210.206 167.190.119.253 157.230.110.125 10.212.36.80
144.116.13.5 128.210.195.67 201.214.146.153 2606:4700:10::6816:2901
2606:4700:10::6814:9012 2606:4700:10::ac43:1974 2606:4700:10::6816:1076 2606:4700:10::ac43:1612
2606:4700:10::6816:1634 2606:4700:10::6816:2711 2606:4700:10::6814:5706 10.227.145.31