Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.234.34.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.234.34.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:42:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.34.234.213.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 213.234.34.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
95.189.108.107 attackspam
5555/tcp 2323/tcp 23/tcp...
[2019-06-14/07-06]13pkt,4pt.(tcp)
2019-07-07 17:40:27
202.69.66.130 attackspam
Automatic report
2019-07-07 17:41:06
35.201.196.94 attackspam
Jul  7 08:34:15 ns41 sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.196.94
Jul  7 08:34:16 ns41 sshd[25465]: Failed password for invalid user bot1 from 35.201.196.94 port 45020 ssh2
Jul  7 08:38:37 ns41 sshd[25672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.196.94
2019-07-07 17:55:14
186.250.114.93 attackspambots
Brute force attempt
2019-07-07 17:39:28
60.191.66.212 attackspam
Invalid user cron from 60.191.66.212 port 53678
2019-07-07 17:14:52
163.179.32.214 attackspam
Banned for posting to wp-login.php without referer {"testcookie":"1","redirect_to":"http:\/\/focohomesandliving.com\/wp-admin\/theme-install.php","log":"admin","wp-submit":"Log In","pwd":"admin"}
2019-07-07 17:29:31
129.204.46.170 attack
Jul  6 23:45:12 debian sshd\[29193\]: Invalid user venom from 129.204.46.170 port 41640
Jul  6 23:45:12 debian sshd\[29193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.46.170
Jul  6 23:45:13 debian sshd\[29193\]: Failed password for invalid user venom from 129.204.46.170 port 41640 ssh2
...
2019-07-07 18:14:57
118.24.9.152 attack
Jul  7 08:56:26 pornomens sshd\[25711\]: Invalid user tobias from 118.24.9.152 port 57806
Jul  7 08:56:26 pornomens sshd\[25711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.9.152
Jul  7 08:56:28 pornomens sshd\[25711\]: Failed password for invalid user tobias from 118.24.9.152 port 57806 ssh2
...
2019-07-07 17:17:20
81.133.111.101 attack
Jul  7 04:24:04 unicornsoft sshd\[9993\]: Invalid user anonymous from 81.133.111.101
Jul  7 04:24:06 unicornsoft sshd\[9993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.111.101
Jul  7 04:24:08 unicornsoft sshd\[9993\]: Failed password for invalid user anonymous from 81.133.111.101 port 34824 ssh2
2019-07-07 17:23:38
128.199.196.155 attackspam
Jul  7 10:11:24 mail sshd\[3086\]: Invalid user joseph from 128.199.196.155
Jul  7 10:11:24 mail sshd\[3086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.196.155
Jul  7 10:11:26 mail sshd\[3086\]: Failed password for invalid user joseph from 128.199.196.155 port 34738 ssh2
...
2019-07-07 17:22:46
124.204.68.210 attackspambots
Jul  7 05:55:47 mail sshd\[25025\]: Invalid user deploy from 124.204.68.210 port 28271
Jul  7 05:55:47 mail sshd\[25025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.68.210
Jul  7 05:55:49 mail sshd\[25025\]: Failed password for invalid user deploy from 124.204.68.210 port 28271 ssh2
Jul  7 05:57:58 mail sshd\[25236\]: Invalid user edward from 124.204.68.210 port 43459
Jul  7 05:57:58 mail sshd\[25236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.68.210
2019-07-07 17:18:50
182.74.252.58 attack
Jul  7 11:59:52 localhost sshd\[5362\]: Invalid user caleb from 182.74.252.58
Jul  7 11:59:52 localhost sshd\[5362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.252.58
Jul  7 11:59:54 localhost sshd\[5362\]: Failed password for invalid user caleb from 182.74.252.58 port 38466 ssh2
Jul  7 12:02:16 localhost sshd\[5564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.252.58  user=root
Jul  7 12:02:18 localhost sshd\[5564\]: Failed password for root from 182.74.252.58 port 33954 ssh2
...
2019-07-07 18:03:19
212.47.237.22 attackbotsspam
Jul710:53:23server2sshd[867]:refusedconnectfrom212.47.237.22\(212.47.237.22\)Jul710:53:23server2sshd[866]:refusedconnectfrom212.47.237.22\(212.47.237.22\)Jul710:53:23server2sshd[870]:refusedconnectfrom212.47.237.22\(212.47.237.22\)Jul710:53:23server2sshd[869]:refusedconnectfrom212.47.237.22\(212.47.237.22\)Jul710:53:23server2sshd[873]:refusedconnectfrom212.47.237.22\(212.47.237.22\)
2019-07-07 18:06:19
83.246.93.211 attack
Jul  7 01:31:23 aat-srv002 sshd[1956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.246.93.211
Jul  7 01:31:25 aat-srv002 sshd[1956]: Failed password for invalid user kw from 83.246.93.211 port 58667 ssh2
Jul  7 01:35:31 aat-srv002 sshd[2006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.246.93.211
Jul  7 01:35:32 aat-srv002 sshd[2006]: Failed password for invalid user gituser from 83.246.93.211 port 55127 ssh2
...
2019-07-07 17:23:06
191.240.69.174 attackbots
smtp auth brute force
2019-07-07 17:13:48

Recently Reported IPs

121.152.156.163 164.38.22.221 141.233.233.233 127.223.180.106
43.135.48.43 252.231.183.132 121.128.108.252 38.144.87.172
233.54.227.146 132.57.202.107 80.97.206.210 13.0.168.152
253.112.154.76 50.83.108.134 219.61.176.158 162.240.112.192
210.10.43.163 64.129.42.169 94.34.76.243 126.40.210.116