Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.43.11.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.43.11.21.			IN	A

;; AUTHORITY SECTION:
.			108	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:31:31 CST 2022
;; MSG SIZE  rcvd: 103
Host info
21.11.43.5.in-addr.arpa domain name pointer 21.11.43.5.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.11.43.5.in-addr.arpa	name = 21.11.43.5.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.137.74.57 attackspambots
Jul  1 08:49:16 tux-35-217 sshd\[23157\]: Invalid user alpha from 79.137.74.57 port 47774
Jul  1 08:49:16 tux-35-217 sshd\[23157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.74.57
Jul  1 08:49:18 tux-35-217 sshd\[23157\]: Failed password for invalid user alpha from 79.137.74.57 port 47774 ssh2
Jul  1 08:51:50 tux-35-217 sshd\[23161\]: Invalid user leng from 79.137.74.57 port 35413
Jul  1 08:51:50 tux-35-217 sshd\[23161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.74.57
...
2019-07-01 21:42:13
216.218.206.103 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 21:06:42
74.82.47.28 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-01 21:07:48
200.60.97.82 attackspambots
Jul  1 04:36:05 vtv3 sshd\[3812\]: Invalid user testftp from 200.60.97.82 port 46108
Jul  1 04:36:05 vtv3 sshd\[3812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.97.82
Jul  1 04:36:08 vtv3 sshd\[3812\]: Failed password for invalid user testftp from 200.60.97.82 port 46108 ssh2
Jul  1 04:43:12 vtv3 sshd\[7025\]: Invalid user build from 200.60.97.82 port 39618
Jul  1 04:43:12 vtv3 sshd\[7025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.97.82
Jul  1 04:56:19 vtv3 sshd\[13341\]: Invalid user es from 200.60.97.82 port 54214
Jul  1 04:56:19 vtv3 sshd\[13341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.97.82
Jul  1 04:56:21 vtv3 sshd\[13341\]: Failed password for invalid user es from 200.60.97.82 port 54214 ssh2
Jul  1 05:03:03 vtv3 sshd\[16345\]: Invalid user fengjian from 200.60.97.82 port 47512
Jul  1 05:03:03 vtv3 sshd\[16345\]: pam_unix\(sshd:aut
2019-07-01 21:38:09
80.82.77.227 attack
01.07.2019 11:46:07 Connection to port 5901 blocked by firewall
2019-07-01 21:27:22
211.52.103.197 attack
Invalid user mailer from 211.52.103.197 port 37530
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.52.103.197
Failed password for invalid user mailer from 211.52.103.197 port 37530 ssh2
Invalid user pai from 211.52.103.197 port 57088
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.52.103.197
2019-07-01 21:42:48
178.128.117.98 attackspam
Automatic report - Web App Attack
2019-07-01 21:11:37
219.153.33.162 attackbots
Jul  1 14:45:16 SilenceServices sshd[25878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.162
Jul  1 14:45:18 SilenceServices sshd[25878]: Failed password for invalid user trinity from 219.153.33.162 port 57502 ssh2
Jul  1 14:46:53 SilenceServices sshd[26952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.33.162
2019-07-01 21:19:16
104.248.45.110 attackspambots
WP Authentication failure
2019-07-01 21:31:58
1.190.186.229 attack
" "
2019-07-01 21:06:20
67.227.188.26 attack
Jul  1 05:40:57 MK-Soft-Root2 sshd\[14167\]: Invalid user alice from 67.227.188.26 port 40602
Jul  1 05:40:57 MK-Soft-Root2 sshd\[14167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.227.188.26
Jul  1 05:40:59 MK-Soft-Root2 sshd\[14167\]: Failed password for invalid user alice from 67.227.188.26 port 40602 ssh2
...
2019-07-01 20:57:11
54.36.149.13 attackbots
Automatic report - Web App Attack
2019-07-01 21:06:01
216.144.251.86 attackbotsspam
Invalid user sv from 216.144.251.86 port 37636
2019-07-01 21:21:26
37.187.79.117 attackspambots
Jul  1 11:10:14 lnxweb62 sshd[30229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117
Jul  1 11:10:14 lnxweb62 sshd[30229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.79.117
2019-07-01 20:55:30
95.8.234.229 attack
firewall-block, port(s): 37215/tcp
2019-07-01 21:16:50

Recently Reported IPs

5.43.200.255 5.43.209.4 5.42.115.158 5.43.213.60
5.44.254.216 5.43.219.249 5.45.207.118 5.45.207.137
5.45.207.147 5.53.235.1 5.54.222.190 5.55.73.95
5.52.204.178 5.55.98.181 5.55.124.44 5.57.227.86
5.55.254.62 5.55.103.91 5.57.9.226 5.62.34.11