Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bulgaria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
212.21.130.49 attack
port scan and connect, tcp 80 (http)
2020-03-12 06:58:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.21.130.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.21.130.189.			IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:18:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 189.130.21.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.130.21.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.117.154.216 attackbotsspam
23/tcp
[2019-07-02]1pkt
2019-07-03 04:31:46
80.211.189.126 attackbotsspam
Automatic report - Web App Attack
2019-07-03 04:41:00
101.21.234.67 attackbots
5500/tcp
[2019-07-02]1pkt
2019-07-03 04:54:02
132.232.45.138 attack
Jul  2 21:33:43 fr01 sshd[7097]: Invalid user prestashop from 132.232.45.138
Jul  2 21:33:43 fr01 sshd[7097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.45.138
Jul  2 21:33:43 fr01 sshd[7097]: Invalid user prestashop from 132.232.45.138
Jul  2 21:33:46 fr01 sshd[7097]: Failed password for invalid user prestashop from 132.232.45.138 port 51108 ssh2
...
2019-07-03 04:52:37
31.220.40.54 attack
SSH bruteforce
2019-07-03 04:09:40
190.109.189.194 attackspam
Unauthorised access (Jul  2) SRC=190.109.189.194 LEN=40 TTL=243 ID=59425 DF TCP DPT=8080 WINDOW=14600 SYN
2019-07-03 04:16:53
122.129.121.149 attackbots
Jul  2 21:47:01 dev0-dcde-rnet sshd[24768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.129.121.149
Jul  2 21:47:03 dev0-dcde-rnet sshd[24768]: Failed password for invalid user newrelic from 122.129.121.149 port 36656 ssh2
Jul  2 21:56:50 dev0-dcde-rnet sshd[24795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.129.121.149
2019-07-03 04:20:17
77.32.154.85 attack
$f2bV_matches
2019-07-03 04:18:54
171.249.225.89 attack
Unauthorised access (Jul  2) SRC=171.249.225.89 LEN=44 TTL=47 ID=23096 TCP DPT=23 WINDOW=28239 SYN
2019-07-03 04:39:57
207.46.13.120 attack
Automatic report - Web App Attack
2019-07-03 04:09:59
220.194.237.43 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-03 04:42:44
27.37.254.187 attackspam
23/tcp
[2019-07-02]1pkt
2019-07-03 04:16:19
177.53.237.108 attackbots
$f2bV_matches
2019-07-03 04:47:00
177.68.214.191 attackspam
8080/tcp
[2019-07-02]1pkt
2019-07-03 04:18:32
118.70.182.185 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-03 04:17:39

Recently Reported IPs

159.56.112.6 187.254.163.97 178.55.250.34 104.212.139.239
45.74.23.122 3.146.177.90 179.228.181.190 111.73.233.58
139.93.152.225 160.166.198.161 150.178.166.98 104.189.44.110
174.118.24.55 158.61.111.1 192.205.38.57 16.109.191.10
57.61.154.59 101.66.98.83 251.213.17.13 131.168.121.113