Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Helmstedt

Region: Lower Saxony

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: Vodafone Kabel Deutschland GmbH

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.16.44.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7718
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;31.16.44.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 00:23:46 CST 2019
;; MSG SIZE  rcvd: 115

Host info
Host 21.44.16.31.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.44.16.31.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.241.244.92 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-08-16 08:25:14
104.152.58.98 attack
Aug 15 22:22:07 uapps sshd[30972]: Invalid user admin from 104.152.58.98 port 43328
Aug 15 22:22:09 uapps sshd[30972]: Failed password for invalid user admin from 104.152.58.98 port 43328 ssh2
Aug 15 22:22:09 uapps sshd[30972]: Received disconnect from 104.152.58.98 port 43328:11: Bye Bye [preauth]
Aug 15 22:22:09 uapps sshd[30972]: Disconnected from invalid user admin 104.152.58.98 port 43328 [preauth]
Aug 15 22:22:10 uapps sshd[30974]: Invalid user admin from 104.152.58.98 port 43426
Aug 15 22:22:12 uapps sshd[30974]: Failed password for invalid user admin from 104.152.58.98 port 43426 ssh2
Aug 15 22:22:14 uapps sshd[30974]: Received disconnect from 104.152.58.98 port 43426:11: Bye Bye [preauth]
Aug 15 22:22:14 uapps sshd[30974]: Disconnected from invalid user admin 104.152.58.98 port 43426 [preauth]
Aug 15 22:22:15 uapps sshd[30976]: Invalid user admin from 104.152.58.98 port 43528
Aug 15 22:22:16 uapps sshd[30976]: Failed password for invalid user admin from 104.152........
-------------------------------
2020-08-16 08:20:13
175.24.100.238 attackspambots
Aug 16 05:49:03 abendstille sshd\[17459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.100.238  user=root
Aug 16 05:49:06 abendstille sshd\[17459\]: Failed password for root from 175.24.100.238 port 38426 ssh2
Aug 16 05:53:10 abendstille sshd\[21140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.100.238  user=root
Aug 16 05:53:12 abendstille sshd\[21140\]: Failed password for root from 175.24.100.238 port 53532 ssh2
Aug 16 05:57:04 abendstille sshd\[24919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.100.238  user=root
...
2020-08-16 12:06:24
212.129.59.36 attackbotsspam
212.129.59.36 - - [16/Aug/2020:04:57:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2369 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.59.36 - - [16/Aug/2020:04:57:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2388 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.59.36 - - [16/Aug/2020:04:57:05 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-16 12:06:45
83.97.20.31 attackspam
Automatic report after SMTP connect attempts
2020-08-16 08:21:37
137.27.187.66 attackspambots
Aug 15 14:25:46 castrum sshd[10643]: Invalid user admin from 137.27.187.66
Aug 15 14:25:49 castrum sshd[10643]: Failed password for invalid user admin from 137.27.187.66 port 38294 ssh2
Aug 15 14:25:49 castrum sshd[10643]: Received disconnect from 137.27.187.66: 11: Bye Bye [preauth]
Aug 15 14:25:49 castrum sshd[10645]: Invalid user admin from 137.27.187.66


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=137.27.187.66
2020-08-16 08:29:47
51.38.37.89 attackbotsspam
Aug 16 00:53:13 firewall sshd[836]: Failed password for root from 51.38.37.89 port 40880 ssh2
Aug 16 00:57:00 firewall sshd[892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.89  user=root
Aug 16 00:57:02 firewall sshd[892]: Failed password for root from 51.38.37.89 port 51270 ssh2
...
2020-08-16 12:08:12
218.92.0.198 attack
2020-08-16T02:33:15.793388rem.lavrinenko.info sshd[14046]: refused connect from 218.92.0.198 (218.92.0.198)
2020-08-16T02:34:23.065284rem.lavrinenko.info sshd[14047]: refused connect from 218.92.0.198 (218.92.0.198)
2020-08-16T02:35:27.173371rem.lavrinenko.info sshd[14050]: refused connect from 218.92.0.198 (218.92.0.198)
2020-08-16T02:36:29.016061rem.lavrinenko.info sshd[14052]: refused connect from 218.92.0.198 (218.92.0.198)
2020-08-16T02:37:32.580889rem.lavrinenko.info sshd[14054]: refused connect from 218.92.0.198 (218.92.0.198)
...
2020-08-16 08:42:37
116.196.105.232 attack
Aug 16 13:57:01 localhost sshd[2508834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.105.232  user=root
Aug 16 13:57:04 localhost sshd[2508834]: Failed password for root from 116.196.105.232 port 42206 ssh2
...
2020-08-16 12:07:04
195.154.236.210 attackspambots
195.154.236.210 - - [15/Aug/2020:23:39:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1908 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
195.154.236.210 - - [15/Aug/2020:23:39:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
195.154.236.210 - - [15/Aug/2020:23:39:12 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-16 08:43:20
159.65.185.253 attack
Automatic report generated by Wazuh
2020-08-16 08:27:33
222.186.31.166 attack
Aug 16 06:02:02 * sshd[4419]: Failed password for root from 222.186.31.166 port 24923 ssh2
2020-08-16 12:03:40
75.163.99.93 attack
2020-08-15T23:23:35.347221mail.capacul.net sshd[5936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75-163-99-93.omah.qwest.net  user=r.r
2020-08-15T23:23:37.443548mail.capacul.net sshd[5936]: Failed password for r.r from 75.163.99.93 port 43766 ssh2
2020-08-15T23:23:39.028018mail.capacul.net sshd[5936]: Failed password for r.r from 75.163.99.93 port 43766 ssh2
2020-08-15T23:23:41.141046mail.capacul.net sshd[5936]: Failed password for r.r from 75.163.99.93 port 43766 ssh2
2020-08-15T23:23:43.852419mail.capacul.net sshd[5936]: Failed password for r.r from 75.163.99.93 port 43766 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=75.163.99.93
2020-08-16 08:28:32
74.102.28.162 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-08-16 08:18:44
218.92.0.168 attack
2020-08-16T07:00:29.185617afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2
2020-08-16T07:00:32.626257afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2
2020-08-16T07:00:35.984755afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2
2020-08-16T07:00:35.984882afi-git.jinr.ru sshd[21116]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 51601 ssh2 [preauth]
2020-08-16T07:00:35.984897afi-git.jinr.ru sshd[21116]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-16 12:04:03

Recently Reported IPs

111.154.69.71 51.67.35.179 54.39.20.23 116.246.255.111
92.128.219.245 62.238.135.24 2620:18c::168 136.219.174.6
70.160.149.65 78.15.99.37 97.178.145.224 58.20.174.180
96.218.240.81 54.100.2.4 182.150.62.74 132.151.245.144
2003:d2:1f0c:5136:1c22:5286:386d:47b0 178.216.140.158 133.220.224.96 135.246.133.25