Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.21.131.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;234.21.131.82.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041702 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 08:14:58 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 82.131.21.234.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.131.21.234.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.252.161.15 attackspam
kidness.family 89.252.161.15 \[25/Jun/2019:04:39:05 +0200\] "POST /wp-login.php HTTP/1.1" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
kidness.family 89.252.161.15 \[25/Jun/2019:04:39:10 +0200\] "POST /wp-login.php HTTP/1.1" 200 5569 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-25 13:42:31
206.189.188.223 attackbotsspam
Invalid user oracle from 206.189.188.223 port 36760
2019-06-25 14:25:43
120.224.143.68 attack
Invalid user tk from 120.224.143.68 port 49204
2019-06-25 14:19:44
212.64.82.99 attackspambots
Invalid user qu from 212.64.82.99 port 40688
2019-06-25 13:48:18
2.38.90.101 attackspambots
Invalid user mt from 2.38.90.101 port 56782
2019-06-25 14:25:11
2400:6180:0:d0::cf3:7001 attackbotsspam
C1,WP GET /digitale-produkte/wp-login.php
2019-06-25 13:46:56
177.44.74.206 attackbots
Autoban   177.44.74.206 AUTH/CONNECT
2019-06-25 13:37:29
217.182.205.162 attackspambots
Invalid user ian from 217.182.205.162 port 44817
2019-06-25 13:47:33
157.230.33.26 attackspam
Automatic report - Web App Attack
2019-06-25 14:17:27
182.73.47.154 attackbots
Jun 25 07:23:55 meumeu sshd[27211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.47.154 
Jun 25 07:23:57 meumeu sshd[27211]: Failed password for invalid user gameserver from 182.73.47.154 port 36986 ssh2
Jun 25 07:32:10 meumeu sshd[28109]: Failed password for www-data from 182.73.47.154 port 46422 ssh2
...
2019-06-25 14:14:47
79.161.218.122 attack
Jun 25 00:56:29 nextcloud sshd\[22470\]: Invalid user userftp from 79.161.218.122
Jun 25 00:56:29 nextcloud sshd\[22470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.161.218.122
Jun 25 00:56:30 nextcloud sshd\[22470\]: Failed password for invalid user userftp from 79.161.218.122 port 57704 ssh2
...
2019-06-25 13:56:23
220.247.175.58 attackspambots
Jun 25 05:31:09 MK-Soft-Root1 sshd\[6564\]: Invalid user zero from 220.247.175.58 port 32985
Jun 25 05:31:09 MK-Soft-Root1 sshd\[6564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.175.58
Jun 25 05:31:11 MK-Soft-Root1 sshd\[6564\]: Failed password for invalid user zero from 220.247.175.58 port 32985 ssh2
...
2019-06-25 14:10:37
201.248.90.19 attack
Invalid user test from 201.248.90.19 port 39422
2019-06-25 13:59:03
206.189.136.160 attackbots
Automatic report - Web App Attack
2019-06-25 13:58:40
123.207.233.84 attack
Jun 25 01:03:10 [host] sshd[15174]: Invalid user extension from 123.207.233.84
Jun 25 01:03:10 [host] sshd[15174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.233.84
Jun 25 01:03:11 [host] sshd[15174]: Failed password for invalid user extension from 123.207.233.84 port 38104 ssh2
2019-06-25 13:41:37

Recently Reported IPs

193.112.185.159 103.253.40.170 51.89.136.104 129.226.190.74
45.9.122.46 117.157.104.214 200.175.185.54 134.175.188.204
202.109.244.26 117.65.46.255 106.13.209.80 27.145.137.180
114.237.109.186 98.220.134.161 107.182.25.2 198.175.68.37
157.245.250.190 37.24.148.226 31.217.162.184 138.68.75.113