Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.56.79.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.56.79.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:11:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 145.79.56.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.79.56.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.16.109.149 attackspam
Automatic report - SSH Brute-Force Attack
2019-07-25 14:16:47
62.231.7.221 attack
2019-07-25T08:19:30.977925centos sshd\[23220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.231.7.221  user=root
2019-07-25T08:19:32.780018centos sshd\[23220\]: Failed password for root from 62.231.7.221 port 59429 ssh2
2019-07-25T08:19:33.447461centos sshd\[23223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.231.7.221  user=root
2019-07-25 14:23:07
213.47.150.134 attackspambots
SSH Bruteforce
2019-07-25 13:54:16
168.235.77.222 attackbots
Jul 25 05:26:58 cp sshd[1076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.235.77.222
2019-07-25 14:12:10
134.209.29.180 attackbots
2019-07-25T12:12:13.675254enmeeting.mahidol.ac.th sshd\[14708\]: Invalid user mqm from 134.209.29.180 port 36475
2019-07-25T12:12:13.694436enmeeting.mahidol.ac.th sshd\[14708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.29.180
2019-07-25T12:12:15.954920enmeeting.mahidol.ac.th sshd\[14708\]: Failed password for invalid user mqm from 134.209.29.180 port 36475 ssh2
...
2019-07-25 14:11:09
103.45.172.240 attackbots
Unauthorized connection attempt from IP address 103.45.172.240 on Port 445(SMB)
2019-07-25 13:38:08
58.27.240.66 attackbots
Unauthorized connection attempt from IP address 58.27.240.66 on Port 445(SMB)
2019-07-25 13:53:24
80.237.68.228 attackbots
Jul 25 07:32:37 legacy sshd[1841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.237.68.228
Jul 25 07:32:39 legacy sshd[1841]: Failed password for invalid user docker from 80.237.68.228 port 47500 ssh2
Jul 25 07:37:09 legacy sshd[2017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.237.68.228
...
2019-07-25 13:55:41
185.53.88.22 attackspam
\[2019-07-25 01:49:50\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-25T01:49:50.473-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441144630211",SessionID="0x7ff4d004fe18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/59887",ACLName="no_extension_match"
\[2019-07-25 01:51:11\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-25T01:51:11.452-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9441144630211",SessionID="0x7ff4d0043b88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/55330",ACLName="no_extension_match"
\[2019-07-25 01:52:42\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-25T01:52:42.190-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441144630211",SessionID="0x7ff4d01dd1d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/59426",ACLName="no_extensi
2019-07-25 14:14:56
189.160.166.38 attackspam
Unauthorized connection attempt from IP address 189.160.166.38 on Port 445(SMB)
2019-07-25 13:19:47
192.190.42.38 attackbots
19/7/24@22:06:24: FAIL: Alarm-Intrusion address from=192.190.42.38
...
2019-07-25 13:58:17
187.1.28.194 attackspam
SMTP-sasl brute force
...
2019-07-25 13:28:46
159.65.81.187 attackbotsspam
Invalid user admin from 159.65.81.187 port 55358
2019-07-25 14:26:45
118.99.93.65 attackbots
Unauthorized connection attempt from IP address 118.99.93.65 on Port 445(SMB)
2019-07-25 14:29:38
91.126.147.62 attackbotsspam
19/7/24@22:06:33: FAIL: IoT-Telnet address from=91.126.147.62
...
2019-07-25 13:49:12

Recently Reported IPs

17.138.239.69 250.218.105.75 50.124.179.4 208.177.37.51
21.4.60.138 124.141.90.210 108.64.229.40 87.14.49.202
8.29.27.29 231.244.227.96 154.118.145.26 147.42.214.178
47.53.87.179 30.201.134.16 94.19.84.227 171.216.129.219
248.94.62.59 9.121.40.236 108.166.14.185 172.180.207.41