Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Antigua and Barbuda

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.21.56.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.21.56.20.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:23:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
20.56.21.213.in-addr.arpa domain name pointer 20.56.21.213.at-home.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.56.21.213.in-addr.arpa	name = 20.56.21.213.at-home.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.147.11 attackbotsspam
firewall-block, port(s): 147/tcp
2020-05-21 18:37:38
175.8.170.127 attack
firewall-block, port(s): 23/tcp
2020-05-21 18:32:13
93.174.93.195 attackspam
05/21/2020-06:21:07.135069 93.174.93.195 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-05-21 18:23:50
113.172.230.208 attackbots
xmlrpc attack
2020-05-21 17:57:06
178.128.117.156 attack
" "
2020-05-21 18:29:34
129.226.61.157 attackspambots
Invalid user kle from 129.226.61.157 port 41176
2020-05-21 18:02:31
106.12.59.23 attack
" "
2020-05-21 18:14:32
123.125.194.150 attackbots
" "
2020-05-21 18:33:12
61.218.122.198 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-05-21 17:58:56
80.211.89.9 attackspam
Invalid user rko from 80.211.89.9 port 41282
2020-05-21 18:25:57
182.75.216.190 attackspam
May 21 06:15:33 firewall sshd[18909]: Invalid user bdd from 182.75.216.190
May 21 06:15:35 firewall sshd[18909]: Failed password for invalid user bdd from 182.75.216.190 port 49950 ssh2
May 21 06:19:44 firewall sshd[18975]: Invalid user tjz from 182.75.216.190
...
2020-05-21 18:11:55
205.185.113.140 attackbotsspam
2020-05-21T11:50:23.190662amanda2.illicoweb.com sshd\[13678\]: Invalid user urg from 205.185.113.140 port 45602
2020-05-21T11:50:23.195989amanda2.illicoweb.com sshd\[13678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140
2020-05-21T11:50:25.142038amanda2.illicoweb.com sshd\[13678\]: Failed password for invalid user urg from 205.185.113.140 port 45602 ssh2
2020-05-21T11:53:56.668174amanda2.illicoweb.com sshd\[13736\]: Invalid user hlv from 205.185.113.140 port 40258
2020-05-21T11:53:56.674156amanda2.illicoweb.com sshd\[13736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.140
...
2020-05-21 18:21:41
37.59.61.13 attackspam
Invalid user nys from 37.59.61.13 port 35060
2020-05-21 18:21:25
61.76.169.138 attack
May 21 11:11:59 root sshd[30761]: Invalid user kra from 61.76.169.138
...
2020-05-21 18:06:06
101.51.14.159 attackspambots
May 21 05:50:59 web01 sshd[20956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.51.14.159 
May 21 05:51:01 web01 sshd[20956]: Failed password for invalid user service from 101.51.14.159 port 61631 ssh2
...
2020-05-21 17:55:01

Recently Reported IPs

182.129.50.171 170.245.221.174 181.101.95.217 178.62.49.225
52.100.0.224 188.166.213.4 175.11.85.3 123.10.23.196
177.155.134.37 118.173.142.200 103.19.152.40 151.237.7.33
222.80.39.21 112.53.155.22 183.53.241.68 148.240.67.235
123.114.48.114 124.121.85.216 61.152.143.36 210.5.110.122