Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.214.253.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.214.253.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:19:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 157.253.214.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.253.214.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.251.235.72 attack
Email rejected due to spam filtering
2020-06-20 15:47:30
43.245.185.66 attackspambots
2020-06-20T08:58:32.820449v22018076590370373 sshd[8274]: Invalid user ftpd from 43.245.185.66 port 34960
2020-06-20T08:58:32.825741v22018076590370373 sshd[8274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.245.185.66
2020-06-20T08:58:32.820449v22018076590370373 sshd[8274]: Invalid user ftpd from 43.245.185.66 port 34960
2020-06-20T08:58:35.042008v22018076590370373 sshd[8274]: Failed password for invalid user ftpd from 43.245.185.66 port 34960 ssh2
2020-06-20T09:02:29.313346v22018076590370373 sshd[25611]: Invalid user admin from 43.245.185.66 port 34216
...
2020-06-20 15:32:56
170.254.226.90 attackspambots
<6 unauthorized SSH connections
2020-06-20 15:41:27
141.98.10.199 attackspam
" "
2020-06-20 15:49:02
49.232.135.102 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-20 15:58:54
202.137.142.28 attack
'IP reached maximum auth failures for a one day block'
2020-06-20 16:12:30
185.202.1.123 attackspambots
Unauthorized connection attempt detected from IP address 185.202.1.123 to port 3389
2020-06-20 15:59:26
36.68.179.193 attackspam
1592625102 - 06/20/2020 05:51:42 Host: 36.68.179.193/36.68.179.193 Port: 445 TCP Blocked
2020-06-20 15:35:38
103.228.117.244 attackspambots
Unauthorized access detected from black listed ip!
2020-06-20 16:01:48
185.186.76.190 attackspam
Fail2Ban Ban Triggered
2020-06-20 16:07:14
139.59.57.2 attackspambots
2020-06-20T06:54:28.006272upcloud.m0sh1x2.com sshd[13160]: Invalid user shiela123 from 139.59.57.2 port 44214
2020-06-20 15:33:40
159.89.155.124 attack
$f2bV_matches
2020-06-20 15:30:52
106.54.255.11 attackspam
2020-06-20T06:45:27.367779mail.csmailer.org sshd[22972]: Failed password for root from 106.54.255.11 port 33904 ssh2
2020-06-20T06:48:36.524382mail.csmailer.org sshd[23567]: Invalid user edu01 from 106.54.255.11 port 38634
2020-06-20T06:48:36.527669mail.csmailer.org sshd[23567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.255.11
2020-06-20T06:48:36.524382mail.csmailer.org sshd[23567]: Invalid user edu01 from 106.54.255.11 port 38634
2020-06-20T06:48:38.924763mail.csmailer.org sshd[23567]: Failed password for invalid user edu01 from 106.54.255.11 port 38634 ssh2
...
2020-06-20 15:34:27
177.66.103.164 attackspambots
port scan and connect, tcp 80 (http)
2020-06-20 16:00:56
103.253.113.173 attackspambots
Invalid user tms from 103.253.113.173 port 42837
2020-06-20 16:07:43

Recently Reported IPs

80.232.147.93 149.3.170.228 90.248.128.89 34.225.195.35
181.183.138.70 214.27.214.177 117.255.218.27 81.228.106.207
184.27.74.149 212.224.226.236 84.226.211.27 48.68.106.231
242.169.150.26 28.229.47.123 197.180.56.50 189.105.10.60
215.117.91.75 134.172.10.226 4.254.131.199 251.185.40.26