Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.215.160.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.215.160.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 12:17:44 CST 2025
;; MSG SIZE  rcvd: 107
Host info
21.160.215.219.in-addr.arpa domain name pointer softbank219215160021.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.160.215.219.in-addr.arpa	name = softbank219215160021.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.249.59.12 attackspambots
Unauthorized connection attempt detected from IP address 218.249.59.12 to port 1433 [T]
2020-08-13 23:57:19
79.134.192.230 attack
Unauthorized connection attempt detected from IP address 79.134.192.230 to port 8080 [T]
2020-08-14 00:14:40
113.161.144.254 attackbots
Lines containing failures of 113.161.144.254
Aug 11 07:04:59 nbi-636 sshd[19377]: User r.r from 113.161.144.254 not allowed because not listed in AllowUsers
Aug 11 07:04:59 nbi-636 sshd[19377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.144.254  user=r.r
Aug 11 07:05:00 nbi-636 sshd[19377]: Failed password for invalid user r.r from 113.161.144.254 port 53704 ssh2
Aug 11 07:05:01 nbi-636 sshd[19377]: Received disconnect from 113.161.144.254 port 53704:11: Bye Bye [preauth]
Aug 11 07:05:01 nbi-636 sshd[19377]: Disconnected from invalid user r.r 113.161.144.254 port 53704 [preauth]
Aug 11 07:08:10 nbi-636 sshd[20253]: User r.r from 113.161.144.254 not allowed because not listed in AllowUsers
Aug 11 07:08:10 nbi-636 sshd[20253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.144.254  user=r.r
Aug 11 07:08:12 nbi-636 sshd[20253]: Failed password for invalid user r.r from 113.........
------------------------------
2020-08-14 00:08:38
35.221.220.51 attack
Unauthorized connection attempt detected from IP address 35.221.220.51 to port 80 [T]
2020-08-14 00:18:23
111.113.27.30 attackspam
Unauthorized connection attempt detected from IP address 111.113.27.30 to port 1433 [T]
2020-08-14 00:34:58
123.27.181.244 attackspam
Unauthorized connection attempt detected from IP address 123.27.181.244 to port 445 [T]
2020-08-14 00:33:45
171.237.177.12 attack
Unauthorized connection attempt detected from IP address 171.237.177.12 to port 445 [T]
2020-08-14 00:03:02
1.53.199.0 attackbotsspam
Unauthorized connection attempt detected from IP address 1.53.199.0 to port 445 [T]
2020-08-14 00:21:45
144.21.69.111 attack
Unauthorized connection attempt detected from IP address 144.21.69.111 to port 10443 [T]
2020-08-14 00:04:55
49.207.209.35 attack
Unauthorized connection attempt detected from IP address 49.207.209.35 to port 445 [T]
2020-08-14 00:17:08
167.99.146.47 attackspam
scans once in preceeding hours on the ports (in chronological order) 1070 resulting in total of 2 scans from 167.99.0.0/16 block.
2020-08-14 00:03:52
102.165.30.33 attack
Unauthorized connection attempt detected from IP address 102.165.30.33 to port 443 [T]
2020-08-14 00:10:06
158.58.130.151 attackbots
Unauthorized connection attempt detected from IP address 158.58.130.151 to port 1433 [T]
2020-08-14 00:30:48
191.36.224.62 attackbots
Unauthorized connection attempt detected from IP address 191.36.224.62 to port 445 [T]
2020-08-13 23:59:23
192.241.222.11 attackspambots
Unauthorized connection attempt detected from IP address 192.241.222.11 to port 8098 [T]
2020-08-14 00:26:49

Recently Reported IPs

204.209.72.146 148.106.254.67 22.87.241.119 101.83.67.133
88.114.162.35 254.170.245.113 155.254.91.193 46.11.120.0
222.64.139.132 58.15.247.213 192.157.106.162 224.23.115.75
29.131.227.231 131.138.81.242 79.223.118.229 173.90.67.198
18.190.46.34 254.48.186.146 190.218.187.223 180.33.42.229