Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.21.149.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.21.149.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:58:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 164.149.21.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.149.21.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.1.180.22 attackbotsspam
2020-06-17T08:01:11.899511rocketchat.forhosting.nl sshd[20979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.180.22  user=root
2020-06-17T08:01:13.745281rocketchat.forhosting.nl sshd[20979]: Failed password for root from 116.1.180.22 port 36816 ssh2
2020-06-17T08:05:24.715061rocketchat.forhosting.nl sshd[21054]: Invalid user benjamin from 116.1.180.22 port 58622
...
2020-06-17 14:30:32
51.75.125.16 attack
Invalid user akhil from 51.75.125.16 port 35386
2020-06-17 14:34:04
222.186.175.23 attackbots
Jun 17 08:29:07 minden010 sshd[1370]: Failed password for root from 222.186.175.23 port 27324 ssh2
Jun 17 08:29:17 minden010 sshd[1419]: Failed password for root from 222.186.175.23 port 62425 ssh2
Jun 17 08:29:19 minden010 sshd[1419]: Failed password for root from 222.186.175.23 port 62425 ssh2
...
2020-06-17 14:29:50
115.159.93.67 attackspam
Jun 17 06:13:12 jumpserver sshd[110765]: Failed password for invalid user web1 from 115.159.93.67 port 35705 ssh2
Jun 17 06:17:12 jumpserver sshd[110799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.93.67  user=root
Jun 17 06:17:14 jumpserver sshd[110799]: Failed password for root from 115.159.93.67 port 57700 ssh2
...
2020-06-17 14:26:00
121.200.61.37 attackspambots
2020-06-17T08:56:54.718158mail.standpoint.com.ua sshd[10014]: Invalid user dev from 121.200.61.37 port 38632
2020-06-17T08:56:54.720813mail.standpoint.com.ua sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.200.61.37
2020-06-17T08:56:54.718158mail.standpoint.com.ua sshd[10014]: Invalid user dev from 121.200.61.37 port 38632
2020-06-17T08:56:56.954589mail.standpoint.com.ua sshd[10014]: Failed password for invalid user dev from 121.200.61.37 port 38632 ssh2
2020-06-17T08:58:36.571631mail.standpoint.com.ua sshd[10274]: Invalid user test from 121.200.61.37 port 34128
...
2020-06-17 14:15:03
14.162.201.241 attackspam
20/6/16@23:53:57: FAIL: Alarm-Network address from=14.162.201.241
...
2020-06-17 14:44:26
106.243.2.244 attack
"fail2ban match"
2020-06-17 14:20:00
51.77.223.234 attackspambots
(sshd) Failed SSH login from 51.77.223.234 (FR/France/vps-9d68718b.vps.ovh.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 17 07:13:51 amsweb01 sshd[11313]: Invalid user rails from 51.77.223.234 port 49356
Jun 17 07:13:52 amsweb01 sshd[11313]: Failed password for invalid user rails from 51.77.223.234 port 49356 ssh2
Jun 17 07:28:29 amsweb01 sshd[13260]: Invalid user jean from 51.77.223.234 port 47982
Jun 17 07:28:30 amsweb01 sshd[13260]: Failed password for invalid user jean from 51.77.223.234 port 47982 ssh2
Jun 17 07:34:52 amsweb01 sshd[14305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.223.234  user=root
2020-06-17 14:50:27
213.32.23.58 attackspam
2020-06-17 07:28:47,216 fail2ban.actions: WARNING [ssh] Ban 213.32.23.58
2020-06-17 14:13:57
196.52.43.84 attack
 TCP (SYN) 196.52.43.84:52762 -> port 2085, len 44
2020-06-17 14:26:18
123.201.20.30 attack
2020-06-17T01:39:41.327050morrigan.ad5gb.com sshd[269838]: Invalid user oracle2 from 123.201.20.30 port 42699
2020-06-17T01:39:42.966070morrigan.ad5gb.com sshd[269838]: Failed password for invalid user oracle2 from 123.201.20.30 port 42699 ssh2
2020-06-17T01:39:43.467828morrigan.ad5gb.com sshd[269838]: Disconnected from invalid user oracle2 123.201.20.30 port 42699 [preauth]
2020-06-17 14:39:47
121.169.203.67 attackspam
DATE:2020-06-17 05:53:54, IP:121.169.203.67, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-06-17 14:47:33
123.16.32.122 attackspam
Unauthorized connection attempt from IP address 123.16.32.122 on port 993
2020-06-17 14:50:46
45.184.225.2 attackspam
(sshd) Failed SSH login from 45.184.225.2 (EC/Ecuador/-): 5 in the last 3600 secs
2020-06-17 14:35:04
222.186.169.192 attack
2020-06-17T09:15:16.819527afi-git.jinr.ru sshd[13478]: Failed password for root from 222.186.169.192 port 58174 ssh2
2020-06-17T09:15:19.536111afi-git.jinr.ru sshd[13478]: Failed password for root from 222.186.169.192 port 58174 ssh2
2020-06-17T09:15:22.526727afi-git.jinr.ru sshd[13478]: Failed password for root from 222.186.169.192 port 58174 ssh2
2020-06-17T09:15:22.526873afi-git.jinr.ru sshd[13478]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 58174 ssh2 [preauth]
2020-06-17T09:15:22.526888afi-git.jinr.ru sshd[13478]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-17 14:18:05

Recently Reported IPs

38.194.176.9 226.40.172.35 237.224.77.189 149.138.96.37
130.39.170.204 109.186.69.204 195.29.69.166 150.195.148.214
255.145.205.21 216.245.92.215 184.81.107.198 29.169.14.74
42.94.110.175 172.158.106.84 116.244.224.23 134.163.146.171
4.23.162.63 144.77.75.60 28.129.162.209 195.54.161.186