Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Hunan

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.242.16.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;222.242.16.21.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100601 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 07 03:17:17 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 21.16.242.222.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.16.242.222.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.55.197.93 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-14 17:30:41
45.136.109.102 attackspam
11/14/2019-03:58:24.279813 45.136.109.102 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-14 17:15:38
182.50.151.9 attackspam
Detected by ModSecurity. Request URI: /xmlrpc.php
2019-11-14 17:39:35
203.93.209.8 attack
Automatic report - Banned IP Access
2019-11-14 17:40:45
175.120.105.73 attackbotsspam
UTC: 2019-11-13 port: 23/tcp
2019-11-14 17:09:40
188.213.49.210 attack
Wordpress scan and BF atack
2019-11-14 17:27:21
222.186.173.215 attack
2019-11-14T02:37:38.518402homeassistant sshd[24366]: Failed password for root from 222.186.173.215 port 56258 ssh2
2019-11-14T09:30:15.583638homeassistant sshd[6204]: Failed none for root from 222.186.173.215 port 12230 ssh2
2019-11-14T09:30:15.812137homeassistant sshd[6204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
...
2019-11-14 17:43:23
106.12.98.192 attackspambots
Automatic report - Banned IP Access
2019-11-14 17:19:31
132.145.170.174 attackspambots
Nov 14 09:21:28 dedicated sshd[5368]: Invalid user ina from 132.145.170.174 port 57270
2019-11-14 17:25:34
154.8.223.122 attackbots
Brute force SMTP login attempts.
2019-11-14 17:35:40
217.17.117.26 attack
Fail2Ban Ban Triggered
2019-11-14 17:29:05
61.177.172.128 attack
UTC: 2019-11-13 port: 22/tcp
2019-11-14 17:25:47
218.107.154.74 attackbotsspam
Nov 14 04:06:52 ny01 sshd[13473]: Failed password for root from 218.107.154.74 port 34136 ssh2
Nov 14 04:11:08 ny01 sshd[13880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.107.154.74
Nov 14 04:11:10 ny01 sshd[13880]: Failed password for invalid user sentry from 218.107.154.74 port 52327 ssh2
2019-11-14 17:11:42
159.89.205.153 attackbots
Nov 14 06:36:52 124388 sshd[26041]: Invalid user francoise from 159.89.205.153 port 38788
Nov 14 06:36:52 124388 sshd[26041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.205.153
Nov 14 06:36:52 124388 sshd[26041]: Invalid user francoise from 159.89.205.153 port 38788
Nov 14 06:36:54 124388 sshd[26041]: Failed password for invalid user francoise from 159.89.205.153 port 38788 ssh2
Nov 14 06:40:55 124388 sshd[26078]: Invalid user ftp from 159.89.205.153 port 48594
2019-11-14 17:09:08
118.42.125.170 attackspam
Nov 14 10:04:56 dedicated sshd[12340]: Invalid user odoo from 118.42.125.170 port 39692
2019-11-14 17:24:06

Recently Reported IPs

14.164.23.219 82.237.0.221 66.3.165.85 160.39.255.217
204.183.142.38 220.161.20.127 190.100.151.199 98.215.27.86
207.80.200.157 200.155.121.64 99.170.219.11 130.194.1.189
221.239.62.155 134.148.242.67 198.91.246.220 164.148.192.54
202.21.187.69 37.174.55.226 117.81.171.174 91.19.244.133