Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Vodafone Kabel Deutschland GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-05-25 19:41:03
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.21.134.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.21.134.216.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052500 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 25 19:40:55 CST 2020
;; MSG SIZE  rcvd: 117
Host info
216.134.21.77.in-addr.arpa domain name pointer ip4d1586d8.dynamic.kabel-deutschland.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
216.134.21.77.in-addr.arpa	name = ip4d1586d8.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.31.255.134 attackspam
unauthorized connection attempt
2020-02-04 13:19:10
208.131.166.46 attack
unauthorized connection attempt
2020-02-04 13:00:45
123.252.235.140 attack
unauthorized connection attempt
2020-02-04 13:29:41
160.176.42.17 attack
Feb  4 05:55:24 grey postfix/smtpd\[28643\]: NOQUEUE: reject: RCPT from unknown\[160.176.42.17\]: 554 5.7.1 Service unavailable\; Client host \[160.176.42.17\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=160.176.42.17\; from=\ to=\ proto=ESMTP helo=\<\[160.176.42.17\]\>
...
2020-02-04 13:12:11
46.38.144.102 attack
Feb  4 05:39:08 mail postfix/smtpd\[25086\]: warning: unknown\[46.38.144.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  4 06:09:22 mail postfix/smtpd\[25833\]: warning: unknown\[46.38.144.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  4 06:10:17 mail postfix/smtpd\[25354\]: warning: unknown\[46.38.144.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Feb  4 06:11:15 mail postfix/smtpd\[25354\]: warning: unknown\[46.38.144.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-02-04 13:14:00
188.27.235.76 attackspam
unauthorized connection attempt
2020-02-04 13:24:01
207.216.89.109 attack
unauthorized connection attempt
2020-02-04 13:01:10
93.174.95.110 attack
Automatic report - Port Scan
2020-02-04 13:37:17
170.84.224.240 attackbots
Feb  3 23:29:54 XXX sshd[45844]: Invalid user es from 170.84.224.240 port 44682
2020-02-04 10:07:16
36.70.43.191 attackbotsspam
unauthorized connection attempt
2020-02-04 13:20:17
93.97.219.82 attack
unauthorized connection attempt
2020-02-04 13:18:37
139.162.98.244 attackbotsspam
unauthorized connection attempt
2020-02-04 13:28:33
183.80.89.155 attack
unauthorized connection attempt
2020-02-04 13:24:23
202.107.188.197 attackbots
Unauthorized connection attempt detected from IP address 202.107.188.197 to port 23 [J]
2020-02-04 13:22:03
180.252.138.186 attackbots
unauthorized connection attempt
2020-02-04 13:11:46

Recently Reported IPs

200.83.135.75 122.176.60.131 85.96.179.185 220.135.147.186
190.78.12.77 125.25.202.66 118.69.77.112 83.234.42.56
183.17.231.220 172.104.101.82 167.71.224.234 86.57.195.60
45.76.156.95 36.80.250.154 117.3.137.30 1.47.64.65
2.134.171.186 20.199.105.19 213.241.25.53 178.21.128.67