Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.42.79.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26587
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.42.79.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 11:59:32 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 34.79.42.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.79.42.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.105 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 8444 proto: TCP cat: Misc Attack
2019-11-29 04:20:48
109.188.88.1 attack
Automatic report - Banned IP Access
2019-11-29 03:56:42
45.93.20.145 attackbots
firewall-block, port(s): 48321/tcp
2019-11-29 04:10:55
90.127.254.108 attackbotsspam
Nov 28 15:29:50 vmanager6029 sshd\[20788\]: Invalid user admin from 90.127.254.108 port 55278
Nov 28 15:29:50 vmanager6029 sshd\[20788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.127.254.108
Nov 28 15:29:52 vmanager6029 sshd\[20788\]: Failed password for invalid user admin from 90.127.254.108 port 55278 ssh2
2019-11-29 04:20:03
37.49.229.167 attack
Triggered: repeated knocking on closed ports.
2019-11-29 04:14:15
49.236.192.136 attackspam
Unauthorized connection attempt from IP address 49.236.192.136 on Port 445(SMB)
2019-11-29 04:13:52
93.208.34.159 attackspam
Nov 28 20:46:10 mail postfix/smtpd[30807]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 28 20:50:02 mail postfix/smtpd[1030]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 28 20:55:11 mail postfix/smtpd[2458]: warning: p5DD0229F.dip0.t-ipconnect.de[93.208.34.159]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-29 04:22:12
176.31.207.10 attackbotsspam
Unauthorized connection attempt from IP address 176.31.207.10 on Port 445(SMB)
2019-11-29 03:58:14
54.158.136.44 attackbots
Triggered: repeated knocking on closed ports.
2019-11-29 04:12:12
87.224.138.249 attackspam
SSHScan
2019-11-29 04:16:41
41.228.22.185 attack
Unauthorized connection attempt from IP address 41.228.22.185 on Port 445(SMB)
2019-11-29 03:52:45
125.26.165.10 attack
Unauthorized connection attempt from IP address 125.26.165.10 on Port 445(SMB)
2019-11-29 03:55:05
36.74.216.221 attackspambots
Invalid user dietpi from 36.74.216.221 port 63990
2019-11-29 04:23:04
89.225.208.146 attackspam
Unauthorized connection attempt from IP address 89.225.208.146 on Port 445(SMB)
2019-11-29 04:09:19
14.162.145.81 attackbotsspam
Unauthorized connection attempt from IP address 14.162.145.81 on Port 445(SMB)
2019-11-29 04:04:24

Recently Reported IPs

137.143.83.175 128.4.209.4 221.142.80.245 106.9.0.176
160.230.163.56 63.232.200.139 5.217.126.243 3.177.250.210
109.34.42.60 192.253.128.49 27.162.41.106 83.62.109.51
73.8.236.144 187.101.209.73 17.132.107.238 76.18.25.196
156.72.168.185 173.125.155.75 43.120.68.61 4.53.134.225