Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Binningen

Region: Basel-Landschaft

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.11.12.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.11.12.21.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040701 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 07 13:39:28 CST 2022
;; MSG SIZE  rcvd: 104
Host info
21.12.11.31.in-addr.arpa domain name pointer cable-static-12-21.breitband.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.12.11.31.in-addr.arpa	name = cable-static-12-21.breitband.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.75.249.224 attack
Oct 13 05:36:01 dignus sshd[15207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.224  user=root
Oct 13 05:36:03 dignus sshd[15207]: Failed password for root from 51.75.249.224 port 48406 ssh2
Oct 13 05:39:27 dignus sshd[15263]: Invalid user gaia from 51.75.249.224 port 52910
Oct 13 05:39:27 dignus sshd[15263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.249.224
Oct 13 05:39:29 dignus sshd[15263]: Failed password for invalid user gaia from 51.75.249.224 port 52910 ssh2
...
2020-10-13 15:58:50
46.101.40.21 attackspam
SIP/5060 Probe, BF, Hack -
2020-10-13 16:00:07
113.200.58.178 attackbots
Fail2Ban Ban Triggered (2)
2020-10-13 15:37:21
202.0.103.51 attackspambots
202.0.103.51 - - [13/Oct/2020:09:13:23 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.0.103.51 - - [13/Oct/2020:09:29:09 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-13 15:57:25
201.72.190.98 attack
Automatic Fail2ban report - Trying login SSH
2020-10-13 15:29:10
14.232.160.213 attackbots
Invalid user sysman from 14.232.160.213 port 40086
2020-10-13 15:38:40
217.160.108.188 attack
MYH,DEF GET /downloader/index.php
2020-10-13 15:54:59
156.203.170.40 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-13 15:43:01
84.229.18.62 attack
Icarus honeypot on github
2020-10-13 15:37:44
5.101.151.41 attackspam
Oct 13 07:36:34 ns392434 sshd[1329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41  user=root
Oct 13 07:36:36 ns392434 sshd[1329]: Failed password for root from 5.101.151.41 port 19980 ssh2
Oct 13 07:44:16 ns392434 sshd[1536]: Invalid user nagano from 5.101.151.41 port 21446
Oct 13 07:44:16 ns392434 sshd[1536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41
Oct 13 07:44:16 ns392434 sshd[1536]: Invalid user nagano from 5.101.151.41 port 21446
Oct 13 07:44:18 ns392434 sshd[1536]: Failed password for invalid user nagano from 5.101.151.41 port 21446 ssh2
Oct 13 07:47:46 ns392434 sshd[1578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41  user=root
Oct 13 07:47:48 ns392434 sshd[1578]: Failed password for root from 5.101.151.41 port 19360 ssh2
Oct 13 07:50:59 ns392434 sshd[1633]: Invalid user blast from 5.101.151.41 port 17238
2020-10-13 15:44:28
101.36.151.78 attack
Oct 13 04:13:09 firewall sshd[5999]: Failed password for invalid user ut from 101.36.151.78 port 34694 ssh2
Oct 13 04:17:26 firewall sshd[6048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.151.78  user=root
Oct 13 04:17:29 firewall sshd[6048]: Failed password for root from 101.36.151.78 port 33138 ssh2
...
2020-10-13 15:55:52
185.220.101.209 attackspam
Hacking
2020-10-13 15:46:34
151.80.212.71 attackspambots
wp-login.php
2020-10-13 16:05:06
194.33.87.229 attackbotsspam
Port scan on 1 port(s): 445
2020-10-13 15:35:16
95.29.50.43 attackbotsspam
SP-Scan 47214:8080 detected 2020.10.12 07:29:49
blocked until 2020.11.30 23:32:36
2020-10-13 15:39:57

Recently Reported IPs

104.241.3.71 152.172.104.126 245.187.167.148 27.28.222.137
22.176.112.226 3.69.67.63 106.50.197.54 192.53.175.98
117.70.217.72 210.212.185.26 55.22.224.68 250.92.198.119
157.78.37.243 7.131.146.90 180.150.142.44 154.195.36.144
31.110.179.36 211.7.29.177 247.15.244.119 129.40.46.150