Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Trento

Region: Trentino-Alto Adige

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.21.138.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.21.138.230.			IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020201 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 06:50:23 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 230.138.21.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 230.138.21.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
65.182.2.241 attack
SSH Brute-Forcing (server1)
2020-08-23 21:12:28
45.232.73.83 attackspam
Aug 23 15:25:36 vpn01 sshd[3268]: Failed password for root from 45.232.73.83 port 40380 ssh2
...
2020-08-23 21:30:25
85.209.0.102 attackbots
Aug 23 13:54:52 cdc sshd[4260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.102  user=root
2020-08-23 20:59:19
106.13.231.103 attack
Aug 23 06:35:36 Host-KLAX-C sshd[24135]: Invalid user nat from 106.13.231.103 port 55920
...
2020-08-23 21:15:17
52.56.86.79 attack
52.56.86.79 - - [23/Aug/2020:14:59:20 +0200] "POST /xmlrpc.php HTTP/1.1" 403 11039 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.56.86.79 - - [23/Aug/2020:15:15:06 +0200] "POST /xmlrpc.php HTTP/1.1" 403 12591 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-23 21:19:44
222.186.175.215 attackspam
Aug 23 06:18:26 dignus sshd[11593]: Failed password for root from 222.186.175.215 port 37396 ssh2
Aug 23 06:18:29 dignus sshd[11593]: Failed password for root from 222.186.175.215 port 37396 ssh2
Aug 23 06:18:33 dignus sshd[11593]: Failed password for root from 222.186.175.215 port 37396 ssh2
Aug 23 06:18:37 dignus sshd[11593]: Failed password for root from 222.186.175.215 port 37396 ssh2
Aug 23 06:18:40 dignus sshd[11593]: Failed password for root from 222.186.175.215 port 37396 ssh2
...
2020-08-23 21:27:58
5.188.158.196 attack
Unauthorised access (Aug 23) SRC=5.188.158.196 LEN=40 TTL=249 ID=18206 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Aug 23) SRC=5.188.158.196 LEN=40 TTL=249 ID=26799 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Aug 23) SRC=5.188.158.196 LEN=40 TTL=249 ID=46513 TCP DPT=3389 WINDOW=1024 SYN
2020-08-23 21:34:02
146.185.130.101 attack
Aug 23 14:25:09 vpn01 sshd[2306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101
Aug 23 14:25:11 vpn01 sshd[2306]: Failed password for invalid user zakir from 146.185.130.101 port 49458 ssh2
...
2020-08-23 20:57:31
178.62.199.240 attackbots
*Port Scan* detected from 178.62.199.240 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 120 seconds
2020-08-23 20:57:43
112.85.42.185 attackspam
Aug 23 18:46:55 dhoomketu sshd[2601113]: Failed password for root from 112.85.42.185 port 31632 ssh2
Aug 23 18:46:58 dhoomketu sshd[2601113]: Failed password for root from 112.85.42.185 port 31632 ssh2
Aug 23 18:47:01 dhoomketu sshd[2601113]: Failed password for root from 112.85.42.185 port 31632 ssh2
Aug 23 18:48:09 dhoomketu sshd[2601141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
Aug 23 18:48:11 dhoomketu sshd[2601141]: Failed password for root from 112.85.42.185 port 24197 ssh2
...
2020-08-23 21:25:16
222.186.175.148 attackspam
Aug 23 15:01:31 santamaria sshd\[28872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Aug 23 15:01:33 santamaria sshd\[28872\]: Failed password for root from 222.186.175.148 port 38156 ssh2
Aug 23 15:01:50 santamaria sshd\[28877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
...
2020-08-23 21:06:59
51.75.140.153 attackspambots
$f2bV_matches
2020-08-23 21:04:04
149.202.160.188 attack
2020-08-23T16:29:53.039469afi-git.jinr.ru sshd[16406]: Invalid user plc from 149.202.160.188 port 40961
2020-08-23T16:29:53.042729afi-git.jinr.ru sshd[16406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.160.188
2020-08-23T16:29:53.039469afi-git.jinr.ru sshd[16406]: Invalid user plc from 149.202.160.188 port 40961
2020-08-23T16:29:55.562886afi-git.jinr.ru sshd[16406]: Failed password for invalid user plc from 149.202.160.188 port 40961 ssh2
2020-08-23T16:32:52.432800afi-git.jinr.ru sshd[17160]: Invalid user oracle from 149.202.160.188 port 38273
...
2020-08-23 21:37:49
188.165.211.206 attackspam
188.165.211.206 - - [23/Aug/2020:14:14:15 +0100] "POST /wp-login.php HTTP/1.1" 200 5618 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.211.206 - - [23/Aug/2020:14:15:20 +0100] "POST /wp-login.php HTTP/1.1" 200 5618 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
188.165.211.206 - - [23/Aug/2020:14:16:24 +0100] "POST /wp-login.php HTTP/1.1" 200 5611 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-23 21:27:13
217.182.68.147 attackspam
2020-08-23T07:58:57.8393431495-001 sshd[50501]: Invalid user openerp from 217.182.68.147 port 41211
2020-08-23T07:59:00.0175781495-001 sshd[50501]: Failed password for invalid user openerp from 217.182.68.147 port 41211 ssh2
2020-08-23T08:03:00.5227181495-001 sshd[50711]: Invalid user administrator from 217.182.68.147 port 45566
2020-08-23T08:03:00.5259291495-001 sshd[50711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-217-182-68.eu
2020-08-23T08:03:00.5227181495-001 sshd[50711]: Invalid user administrator from 217.182.68.147 port 45566
2020-08-23T08:03:02.8337581495-001 sshd[50711]: Failed password for invalid user administrator from 217.182.68.147 port 45566 ssh2
...
2020-08-23 21:28:11

Recently Reported IPs

134.149.220.220 204.147.159.185 98.14.237.134 131.133.177.146
198.202.143.104 103.31.236.108 83.165.248.15 206.254.11.12
104.177.15.182 135.118.34.116 119.117.193.222 97.167.88.216
18.44.174.140 208.81.228.144 78.51.169.145 180.74.92.163
36.68.238.251 160.29.228.137 129.7.14.159 138.223.124.181