Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.21.54.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.21.54.204.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:00:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
204.54.21.213.in-addr.arpa domain name pointer 204.54.21.213.at-home.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.54.21.213.in-addr.arpa	name = 204.54.21.213.at-home.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.136.175.110 attackbots
SSH invalid-user multiple login try
2019-07-09 14:43:51
167.99.195.241 attackspambots
firewall-block, port(s): 23/tcp
2019-07-09 14:40:09
36.81.196.242 attackspambots
Unauthorized connection attempt from IP address 36.81.196.242 on Port 445(SMB)
2019-07-09 13:56:34
113.190.39.162 attack
Unauthorized connection attempt from IP address 113.190.39.162 on Port 445(SMB)
2019-07-09 14:01:49
113.22.58.46 attackspambots
Unauthorized connection attempt from IP address 113.22.58.46 on Port 445(SMB)
2019-07-09 13:55:42
79.0.43.230 attackbotsspam
Unauthorized connection attempt from IP address 79.0.43.230 on Port 445(SMB)
2019-07-09 14:07:02
153.36.236.35 attackspambots
Jul  9 08:12:56 amit sshd\[26148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
Jul  9 08:12:58 amit sshd\[26148\]: Failed password for root from 153.36.236.35 port 27465 ssh2
Jul  9 08:13:15 amit sshd\[26152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
...
2019-07-09 14:49:52
180.76.97.86 attack
2019-07-09T03:30:55.591920abusebot-3.cloudsearch.cf sshd\[14903\]: Invalid user users from 180.76.97.86 port 44284
2019-07-09 14:04:42
90.3.202.234 attackspambots
IP attempted unauthorised action
2019-07-09 14:47:07
14.191.98.255 attack
Jul  9 05:29:48 vps65 sshd\[22907\]: Invalid user noc from 14.191.98.255 port 61107
Jul  9 05:29:49 vps65 sshd\[22907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.191.98.255
...
2019-07-09 14:51:27
141.98.81.38 attack
SSH scan ::
2019-07-09 13:57:01
174.138.14.220 attack
query suspecte, Sniffing for wordpress log:/wordpress9/wp-login.php
2019-07-09 14:06:03
83.239.29.234 attack
Unauthorized connection attempt from IP address 83.239.29.234 on Port 445(SMB)
2019-07-09 14:08:25
95.188.81.255 attackbots
Unauthorized connection attempt from IP address 95.188.81.255 on Port 445(SMB)
2019-07-09 14:42:45
104.248.87.201 attack
Jul  9 06:30:54 srv-4 sshd\[2089\]: Invalid user amandabackup from 104.248.87.201
Jul  9 06:30:54 srv-4 sshd\[2089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.87.201
Jul  9 06:30:56 srv-4 sshd\[2089\]: Failed password for invalid user amandabackup from 104.248.87.201 port 34636 ssh2
...
2019-07-09 14:03:11

Recently Reported IPs

36.80.212.40 45.116.191.231 54.209.153.79 61.98.48.226
209.85.210.42 85.174.205.47 170.246.145.149 223.155.7.249
34.124.223.216 124.153.20.110 175.107.2.233 45.83.67.99
88.225.218.47 107.172.73.224 103.111.137.62 115.150.211.168
67.149.215.197 201.148.23.131 138.122.20.87 193.233.140.116