Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.21.130.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;31.21.130.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:57:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
196.130.21.31.in-addr.arpa domain name pointer 196-130-21-31.ftth.glasoperator.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.130.21.31.in-addr.arpa	name = 196-130-21-31.ftth.glasoperator.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.187.26.149 attackbotsspam
Unauthorized connection attempt from IP address 190.187.26.149 on Port 445(SMB)
2020-01-26 21:49:40
105.112.30.231 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-26 21:53:00
78.188.224.46 attackbotsspam
Automatic report - Port Scan Attack
2020-01-26 21:57:17
125.230.69.108 attackbots
Unauthorized connection attempt from IP address 125.230.69.108 on Port 445(SMB)
2020-01-26 21:40:15
121.169.25.46 attackspambots
Unauthorized connection attempt detected from IP address 121.169.25.46 to port 23 [J]
2020-01-26 21:17:47
107.175.189.104 attackbotsspam
Unauthorized connection attempt detected from IP address 107.175.189.104 to port 2220 [J]
2020-01-26 21:56:41
42.112.205.205 attackbotsspam
Sun Jan 26 06:15:40 2020 - Child process 9921 handling connection
Sun Jan 26 06:15:40 2020 - New connection from: 42.112.205.205:55610
Sun Jan 26 06:15:40 2020 - Sending data to client: [Login: ]
Sun Jan 26 06:16:10 2020 - Child aborting
Sun Jan 26 06:16:10 2020 - Reporting IP address: 42.112.205.205 - mflag: 0
2020-01-26 21:29:41
78.106.143.104 attackspambots
Unauthorized connection attempt from IP address 78.106.143.104 on Port 445(SMB)
2020-01-26 21:54:30
102.189.212.164 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-26 21:19:45
193.226.218.75 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2020-01-26 21:26:47
113.254.10.31 attackbots
Unauthorized connection attempt from IP address 113.254.10.31 on Port 445(SMB)
2020-01-26 21:51:06
114.33.28.236 attack
"Fail2Ban detected SSH brute force attempt"
2020-01-26 21:27:54
27.3.160.62 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-26 21:21:03
158.69.172.227 attack
Unauthorized access detected from banned ip
2020-01-26 21:50:02
94.191.120.108 attack
Jan 26 14:28:14 sd-53420 sshd\[18474\]: Invalid user akiyama from 94.191.120.108
Jan 26 14:28:14 sd-53420 sshd\[18474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
Jan 26 14:28:16 sd-53420 sshd\[18474\]: Failed password for invalid user akiyama from 94.191.120.108 port 51622 ssh2
Jan 26 14:30:48 sd-53420 sshd\[18883\]: Invalid user install from 94.191.120.108
Jan 26 14:30:48 sd-53420 sshd\[18883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.120.108
...
2020-01-26 21:36:51

Recently Reported IPs

188.82.14.141 128.126.244.62 43.87.93.221 101.54.107.13
214.255.31.201 53.1.149.252 250.251.92.147 78.147.167.191
124.2.222.41 207.210.112.199 206.250.61.137 155.21.39.90
57.179.27.73 214.23.0.51 209.174.133.23 150.94.216.121
150.122.27.56 155.179.118.37 80.170.168.54 211.224.85.146