Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Uijeongbu-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: Korea Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.38.21.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54740
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;211.38.21.10.			IN	A

;; AUTHORITY SECTION:
.			2725	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071101 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 12 03:39:27 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 10.21.38.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 10.21.38.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.252.87.15 attackbotsspam
Port Scan
...
2020-08-01 14:37:41
121.16.225.230 attackbots
Unauthorised access (Aug  1) SRC=121.16.225.230 LEN=40 TTL=46 ID=50041 TCP DPT=23 WINDOW=62378 SYN
2020-08-01 14:51:43
134.209.173.240 attackspam
*Port Scan* detected from 134.209.173.240 (US/United States/New Jersey/Clifton/-). 4 hits in the last 125 seconds
2020-08-01 14:31:04
100.11.215.126 attackbotsspam
Attempted connection to ports 80, 8080.
2020-08-01 14:16:02
112.85.42.104 attackbots
Aug  1 06:52:04 rush sshd[14526]: Failed password for root from 112.85.42.104 port 23180 ssh2
Aug  1 06:52:16 rush sshd[14534]: Failed password for root from 112.85.42.104 port 49501 ssh2
Aug  1 06:52:19 rush sshd[14534]: Failed password for root from 112.85.42.104 port 49501 ssh2
...
2020-08-01 14:58:16
92.118.161.5 attack
Unauthorized connection attempt detected from IP address 92.118.161.5 to port 8530
2020-08-01 14:29:57
132.232.4.33 attack
2020-08-01T05:54:53.967123+02:00  sshd[954]: Failed password for root from 132.232.4.33 port 39850 ssh2
2020-08-01 14:31:25
200.69.141.210 attackspam
Invalid user 22 from 200.69.141.210 port 65036
2020-08-01 14:44:04
123.30.190.83 attackspambots
20/7/31@23:54:51: FAIL: Alarm-Network address from=123.30.190.83
20/7/31@23:54:52: FAIL: Alarm-Network address from=123.30.190.83
...
2020-08-01 14:38:53
202.149.85.226 attackbotsspam
Invalid user zqc from 202.149.85.226 port 48860
2020-08-01 14:55:08
89.248.169.12 attackspam
Icarus honeypot on github
2020-08-01 14:16:24
14.177.181.42 attack
Dovecot Invalid User Login Attempt.
2020-08-01 14:42:11
220.123.241.30 attackspam
Invalid user ketan from 220.123.241.30 port 31049
2020-08-01 14:33:37
222.186.31.83 attack
Aug  1 08:27:50 abendstille sshd\[7881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Aug  1 08:27:51 abendstille sshd\[7881\]: Failed password for root from 222.186.31.83 port 25162 ssh2
Aug  1 08:28:00 abendstille sshd\[8127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Aug  1 08:28:02 abendstille sshd\[8127\]: Failed password for root from 222.186.31.83 port 54825 ssh2
Aug  1 08:28:04 abendstille sshd\[8127\]: Failed password for root from 222.186.31.83 port 54825 ssh2
...
2020-08-01 14:29:24
120.31.71.238 attack
Invalid user sxh from 120.31.71.238 port 48258
2020-08-01 14:40:10

Recently Reported IPs

203.201.61.6 111.149.112.20 156.246.91.17 205.184.217.129
111.176.77.15 184.42.70.146 2a01:598:a00a:6277:8d5c:8648:1159:8449 45.235.123.193
178.142.83.103 207.79.64.185 147.91.40.226 174.173.222.230
150.125.215.154 74.28.103.255 77.170.236.118 2003:c0:6f3c:7d00:d958:5a52:744e:a33c
190.122.20.235 173.209.255.202 152.7.128.205 66.65.183.43