Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.145.98.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.145.98.21.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:06:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 21.98.145.38.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.98.145.38.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.221.62 attackspam
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 443 proto: TCP cat: Attempted Information Leak
2019-11-20 00:22:10
89.108.84.221 attackbotsspam
Unauthorized connection attempt from IP address 89.108.84.221 on Port 445(SMB)
2019-11-20 00:39:24
183.82.130.22 attackbotsspam
Unauthorized connection attempt from IP address 183.82.130.22 on Port 445(SMB)
2019-11-20 00:00:17
91.135.252.4 attackspambots
Unauthorized connection attempt from IP address 91.135.252.4 on Port 445(SMB)
2019-11-19 23:56:36
80.92.48.116 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-20 00:19:25
101.228.121.116 attack
Stupid hacker beginer
2019-11-20 00:40:25
101.99.23.63 attack
Unauthorized connection attempt from IP address 101.99.23.63 on Port 445(SMB)
2019-11-20 00:05:43
58.171.34.200 attackspam
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-11-20 00:11:57
117.158.220.93 attackspam
Automatic report - Port Scan
2019-11-20 00:41:33
105.225.193.122 attackspam
Unauthorized connection attempt from IP address 105.225.193.122 on Port 445(SMB)
2019-11-20 00:15:07
103.121.26.150 attackbots
Nov 19 18:41:25 server sshd\[24819\]: Invalid user admin from 103.121.26.150
Nov 19 18:41:25 server sshd\[24819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
Nov 19 18:41:27 server sshd\[24819\]: Failed password for invalid user admin from 103.121.26.150 port 7036 ssh2
Nov 19 19:09:08 server sshd\[31380\]: Invalid user backup from 103.121.26.150
Nov 19 19:09:08 server sshd\[31380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.26.150 
...
2019-11-20 00:22:57
185.8.24.125 attack
fail2ban honeypot
2019-11-20 00:35:32
206.189.151.139 attackspam
Excessive Port-Scanning
2019-11-20 00:03:38
222.186.175.167 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-11-20 00:13:33
159.203.201.42 attack
" "
2019-11-20 00:04:45

Recently Reported IPs

165.224.42.52 227.80.244.9 69.58.182.70 58.159.83.21
101.197.47.175 97.119.65.144 43.152.230.151 157.5.62.82
135.157.13.16 204.50.150.68 19.96.95.84 27.4.189.38
123.194.85.199 155.134.219.25 4.162.14.200 36.29.84.102
92.254.25.108 118.83.161.152 49.53.56.182 214.152.3.90