Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.45.248.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.45.248.211.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 20:25:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 211.248.45.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 211.248.45.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.229.207 attackbots
[2020-08-08 08:02:02] NOTICE[1248][C-00004d6e] chan_sip.c: Call from '' (37.49.229.207:7069) to extension '01148323395006' rejected because extension not found in context 'public'.
[2020-08-08 08:02:02] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T08:02:02.441-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148323395006",SessionID="0x7f27203df9b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229.207/7069",ACLName="no_extension_match"
[2020-08-08 08:11:44] NOTICE[1248][C-00004d75] chan_sip.c: Call from '' (37.49.229.207:9255) to extension '901148323395006' rejected because extension not found in context 'public'.
[2020-08-08 08:11:44] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T08:11:44.490-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901148323395006",SessionID="0x7f27204f0348",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49
...
2020-08-09 01:59:48
157.34.71.4 attack
1596888661 - 08/08/2020 14:11:01 Host: 157.34.71.4/157.34.71.4 Port: 445 TCP Blocked
...
2020-08-09 02:24:38
154.127.180.204 attackbots
Trolling for resource vulnerabilities
2020-08-09 02:19:23
45.88.12.52 attackspam
Aug  8 16:08:52 web-main sshd[802504]: Failed password for root from 45.88.12.52 port 42124 ssh2
Aug  8 16:13:18 web-main sshd[802549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.88.12.52  user=root
Aug  8 16:13:21 web-main sshd[802549]: Failed password for root from 45.88.12.52 port 49476 ssh2
2020-08-09 02:13:47
46.118.123.27 attackspam
Attempts to probe web pages for vulnerable PHP or other applications
2020-08-09 02:31:43
171.251.49.190 attackspam
1596888673 - 08/08/2020 14:11:13 Host: 171.251.49.190/171.251.49.190 Port: 445 TCP Blocked
2020-08-09 02:18:28
193.27.228.216 attack
Attempted to establish connection to non opened port 10584
2020-08-09 02:38:57
190.152.71.230 attackbots
Dovecot Invalid User Login Attempt.
2020-08-09 02:25:58
119.5.157.124 attackbotsspam
2020-08-08T12:02:49.568658abusebot-3.cloudsearch.cf sshd[3275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124  user=root
2020-08-08T12:02:51.364594abusebot-3.cloudsearch.cf sshd[3275]: Failed password for root from 119.5.157.124 port 17368 ssh2
2020-08-08T12:05:42.232274abusebot-3.cloudsearch.cf sshd[3309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124  user=root
2020-08-08T12:05:43.777305abusebot-3.cloudsearch.cf sshd[3309]: Failed password for root from 119.5.157.124 port 37533 ssh2
2020-08-08T12:08:40.546952abusebot-3.cloudsearch.cf sshd[3338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.5.157.124  user=root
2020-08-08T12:08:43.195914abusebot-3.cloudsearch.cf sshd[3338]: Failed password for root from 119.5.157.124 port 57978 ssh2
2020-08-08T12:11:32.010714abusebot-3.cloudsearch.cf sshd[3379]: pam_unix(sshd:auth): authenticati
...
2020-08-09 02:08:16
139.186.4.114 attackspam
2020-08-08T17:24:59+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-08-09 02:31:30
60.246.3.33 attackspam
*Port Scan* detected from 60.246.3.33 (MO/Macao/nz3l33.bb60246.ctm.net). 4 hits in the last 20 seconds
2020-08-09 02:32:48
140.143.247.30 attack
Aug  8 13:47:25 h2646465 sshd[22057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.247.30  user=root
Aug  8 13:47:27 h2646465 sshd[22057]: Failed password for root from 140.143.247.30 port 36682 ssh2
Aug  8 13:58:20 h2646465 sshd[23325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.247.30  user=root
Aug  8 13:58:22 h2646465 sshd[23325]: Failed password for root from 140.143.247.30 port 56392 ssh2
Aug  8 14:02:44 h2646465 sshd[24358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.247.30  user=root
Aug  8 14:02:46 h2646465 sshd[24358]: Failed password for root from 140.143.247.30 port 43040 ssh2
Aug  8 14:07:07 h2646465 sshd[24961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.247.30  user=root
Aug  8 14:07:09 h2646465 sshd[24961]: Failed password for root from 140.143.247.30 port 57918 ssh2
Aug  8 14:11:27 h264
2020-08-09 02:10:15
222.186.175.151 attack
Aug  8 14:51:40 firewall sshd[8966]: Failed password for root from 222.186.175.151 port 11600 ssh2
Aug  8 14:51:44 firewall sshd[8966]: Failed password for root from 222.186.175.151 port 11600 ssh2
Aug  8 14:51:47 firewall sshd[8966]: Failed password for root from 222.186.175.151 port 11600 ssh2
...
2020-08-09 02:02:51
196.3.171.138 attack
Dovecot Invalid User Login Attempt.
2020-08-09 02:15:13
157.245.37.160 attackspambots
Aug  8 18:21:10 PorscheCustomer sshd[32228]: Failed password for root from 157.245.37.160 port 59436 ssh2
Aug  8 18:25:15 PorscheCustomer sshd[32290]: Failed password for root from 157.245.37.160 port 42060 ssh2
...
2020-08-09 02:06:55

Recently Reported IPs

221.120.19.10 59.164.65.227 77.238.122.207 72.108.189.99
234.132.191.130 114.37.166.144 57.195.42.138 54.233.233.190
15.220.227.23 38.7.51.15 19.30.95.33 55.4.72.94
57.218.83.71 115.225.141.250 129.23.138.193 40.134.152.84
97.207.69.103 255.138.35.226 168.169.145.173 141.23.143.45