Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.80.133.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.80.133.21.			IN	A

;; AUTHORITY SECTION:
.			233	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 02:00:44 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 21.133.80.216.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 21.133.80.216.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.68.70.175 attackbotsspam
Aug 23 02:17:11 yabzik sshd[13849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
Aug 23 02:17:13 yabzik sshd[13849]: Failed password for invalid user bmm from 51.68.70.175 port 53016 ssh2
Aug 23 02:21:04 yabzik sshd[15296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
2019-08-23 12:36:20
65.169.38.45 attackbots
Aug 22 23:07:19 xeon cyrus/imap[1633]: badlogin: [65.169.38.45] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-23 11:55:09
218.202.234.66 attack
Aug 22 12:30:04 *** sshd[20567]: Failed password for invalid user auditor from 218.202.234.66 port 47332 ssh2
Aug 22 13:03:13 *** sshd[21815]: Failed password for invalid user lex from 218.202.234.66 port 59587 ssh2
Aug 22 13:05:56 *** sshd[21915]: Failed password for invalid user am2 from 218.202.234.66 port 42296 ssh2
Aug 22 13:08:34 *** sshd[21975]: Failed password for invalid user mihaela from 218.202.234.66 port 53237 ssh2
Aug 22 13:11:14 *** sshd[22090]: Failed password for invalid user xiao from 218.202.234.66 port 35946 ssh2
Aug 22 13:13:54 *** sshd[22135]: Failed password for invalid user dafong from 218.202.234.66 port 46889 ssh2
Aug 22 13:16:37 *** sshd[22190]: Failed password for invalid user ftp_user from 218.202.234.66 port 57829 ssh2
Aug 22 13:19:22 *** sshd[22245]: Failed password for invalid user webadmin from 218.202.234.66 port 40537 ssh2
Aug 22 13:21:59 *** sshd[22331]: Failed password for invalid user wh from 218.202.234.66 port 51478 ssh2
Aug 22 13:30:03 *** sshd[22506]: Failed password
2019-08-23 12:32:06
159.65.148.115 attack
Aug 23 00:20:40 ny01 sshd[21824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.115
Aug 23 00:20:42 ny01 sshd[21824]: Failed password for invalid user addict from 159.65.148.115 port 37506 ssh2
Aug 23 00:26:22 ny01 sshd[22336]: Failed password for root from 159.65.148.115 port 54566 ssh2
2019-08-23 12:27:22
117.5.217.228 attackspam
Unauthorised access (Aug 22) SRC=117.5.217.228 LEN=40 TTL=46 ID=35512 TCP DPT=23 WINDOW=3588 SYN
2019-08-23 11:56:27
113.160.244.144 attackspam
Automatic report - Banned IP Access
2019-08-23 11:40:43
112.94.5.5 attackbots
*Port Scan* detected from 112.94.5.5 (CN/China/-). 4 hits in the last 101 seconds
2019-08-23 12:29:26
36.110.28.94 attackspam
$f2bV_matches
2019-08-23 11:49:33
203.129.226.99 attack
Aug 23 05:43:13 legacy sshd[20973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.226.99
Aug 23 05:43:16 legacy sshd[20973]: Failed password for invalid user cristina from 203.129.226.99 port 46343 ssh2
Aug 23 05:47:05 legacy sshd[21057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.226.99
...
2019-08-23 11:58:24
80.211.51.116 attackbotsspam
Aug 22 22:37:57 yabzik sshd[31169]: Failed password for root from 80.211.51.116 port 58416 ssh2
Aug 22 22:42:02 yabzik sshd[32677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.51.116
Aug 22 22:42:04 yabzik sshd[32677]: Failed password for invalid user bruce from 80.211.51.116 port 47724 ssh2
2019-08-23 12:23:40
177.188.64.150 attack
Unauthorized access to SSH at 22/Aug/2019:19:26:01 +0000.
2019-08-23 11:43:18
107.148.200.211 attack
*Port Scan* detected from 107.148.200.211 (US/United States/-). 4 hits in the last 121 seconds
2019-08-23 12:29:52
42.200.117.25 attack
Honeypot attack, port: 23, PTR: 42-200-117-25.static.imsbiz.com.
2019-08-23 12:33:32
5.135.157.135 attackbots
Aug 23 05:36:56 root sshd[16073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.157.135 
Aug 23 05:36:59 root sshd[16073]: Failed password for invalid user mcc from 5.135.157.135 port 43914 ssh2
Aug 23 05:42:16 root sshd[16156]: Failed password for root from 5.135.157.135 port 33226 ssh2
...
2019-08-23 11:45:59
139.99.201.100 attackbots
Aug 22 21:24:49 lnxmysql61 sshd[26727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.201.100
2019-08-23 12:38:51

Recently Reported IPs

15.200.208.144 192.151.149.202 136.147.177.226 89.109.5.127
45.132.143.14 139.162.152.16 124.123.182.130 78.118.90.105
152.89.216.232 118.70.182.81 103.100.209.222 2.76.74.206
14.116.151.178 133.138.186.148 60.198.97.221 75.25.81.23
131.230.148.0 180.46.81.153 114.10.115.213 77.102.232.136