Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaunas

Region: Kaunas

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 217.17.80.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;217.17.80.21.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:57:34 CST 2021
;; MSG SIZE  rcvd: 41

'
Host info
21.80.17.217.in-addr.arpa domain name pointer data-80-21.cgates.lt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.80.17.217.in-addr.arpa	name = data-80-21.cgates.lt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.240.54.136 attackspambots
Invalid user portal from 58.240.54.136 port 51479
2020-06-27 17:33:26
159.89.177.46 attackspam
Invalid user samba from 159.89.177.46 port 37332
2020-06-27 17:22:29
163.172.60.213 attackspam
163.172.60.213 - - [27/Jun/2020:11:25:09 +0300] "POST /wp-login.php HTTP/1.1" 200 2775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-27 17:40:50
45.65.222.136 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-06-27 17:34:01
84.54.95.142 attackspambots
Jun 27 05:50:58 smtp postfix/smtpd[95617]: NOQUEUE: reject: RCPT from unknown[84.54.95.142]: 554 5.7.1 Service unavailable; Client host [84.54.95.142] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=84.54.95.142; from= to= proto=ESMTP helo=<[213.230.113.52]>
...
2020-06-27 17:31:15
101.108.67.111 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-27 17:13:39
68.183.104.88 attack
invalid login attempt (admin)
2020-06-27 17:47:01
106.75.81.243 attackbotsspam
$f2bV_matches
2020-06-27 17:41:12
64.227.16.110 attack
Automatic report - XMLRPC Attack
2020-06-27 17:36:33
220.133.95.68 attackspambots
Jun 27 02:44:12 lanister sshd[7216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.95.68
Jun 27 02:44:12 lanister sshd[7216]: Invalid user mailserver from 220.133.95.68
Jun 27 02:44:14 lanister sshd[7216]: Failed password for invalid user mailserver from 220.133.95.68 port 52288 ssh2
Jun 27 02:46:48 lanister sshd[7292]: Invalid user nuke from 220.133.95.68
2020-06-27 17:48:49
79.121.113.69 attack
79.121.113.69 - - [27/Jun/2020:10:01:31 +0200] "POST /xmlrpc.php HTTP/1.1" 403 105425 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
79.121.113.69 - - [27/Jun/2020:10:01:31 +0200] "POST /xmlrpc.php HTTP/1.1" 403 105421 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-06-27 17:19:58
117.69.155.111 attack
Jun 27 06:50:12 srv01 postfix/smtpd\[16117\]: warning: unknown\[117.69.155.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 06:54:09 srv01 postfix/smtpd\[13730\]: warning: unknown\[117.69.155.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 06:54:21 srv01 postfix/smtpd\[13730\]: warning: unknown\[117.69.155.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 06:54:38 srv01 postfix/smtpd\[13730\]: warning: unknown\[117.69.155.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 06:54:57 srv01 postfix/smtpd\[13730\]: warning: unknown\[117.69.155.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-27 17:52:53
180.76.111.242 attackspam
Invalid user elasticsearch from 180.76.111.242 port 46196
2020-06-27 17:34:50
45.118.151.85 attack
2020-06-26T23:44:05.337480hostname sshd[3397]: Invalid user mayan from 45.118.151.85 port 51877
2020-06-26T23:44:07.529784hostname sshd[3397]: Failed password for invalid user mayan from 45.118.151.85 port 51877 ssh2
2020-06-26T23:48:11.507965hostname sshd[6979]: Invalid user lds from 45.118.151.85 port 51918
...
2020-06-27 17:27:10
110.185.160.106 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-27 17:13:12

Recently Reported IPs

193.183.98.79 160.154.77.131 93.95.226.237 172.58.99.253
204.44.111.4 212.129.27.250 174.253.64.124 151.246.202.249
13.70.19.194 46.42.69.172 14.236.86.72 103.143.0.22
31.148.149.249 89.64.58.241 209.58.184.101 217.19.147.196
49.77.230.95 114.251.158.53 223.207.220.187 221.181.185.29