Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: 3

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 8.21.11.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;8.21.11.149.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:56:52 CST 2021
;; MSG SIZE  rcvd: 40

'
Host info
Host 149.11.21.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.11.21.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.109.76.6 attackbotsspam
Multiple SSH login attempts.
2020-02-26 18:57:54
178.128.144.227 attackspam
Feb 26 10:26:31 sd-53420 sshd\[32147\]: Invalid user neeraj from 178.128.144.227
Feb 26 10:26:31 sd-53420 sshd\[32147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
Feb 26 10:26:33 sd-53420 sshd\[32147\]: Failed password for invalid user neeraj from 178.128.144.227 port 35350 ssh2
Feb 26 10:33:24 sd-53420 sshd\[32758\]: Invalid user svnroot from 178.128.144.227
Feb 26 10:33:24 sd-53420 sshd\[32758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
...
2020-02-26 18:51:11
177.66.30.182 attackbotsspam
unauthorized connection attempt
2020-02-26 18:39:50
177.237.128.239 attackbotsspam
unauthorized connection attempt
2020-02-26 18:38:59
179.104.172.246 attackbotsspam
unauthorized connection attempt
2020-02-26 18:50:49
64.150.201.17 attack
[portscan] tcp/23 [TELNET]
*(RWIN=59039)(02261117)
2020-02-26 18:58:36
82.81.19.42 attackspambots
unauthorized connection attempt
2020-02-26 18:44:06
156.214.36.133 attack
unauthorized connection attempt
2020-02-26 19:04:43
111.254.78.57 attack
unauthorized connection attempt
2020-02-26 18:28:07
220.82.102.119 attackbots
unauthorized connection attempt
2020-02-26 18:36:12
188.119.30.58 attackbotsspam
unauthorized connection attempt
2020-02-26 18:37:22
122.102.33.202 attack
unauthorized connection attempt
2020-02-26 18:25:46
190.213.43.36 attack
unauthorized connection attempt
2020-02-26 18:50:02
60.17.250.64 attackspambots
unauthorized connection attempt
2020-02-26 18:31:43
59.127.174.184 attackbots
unauthorized connection attempt
2020-02-26 18:46:40

Recently Reported IPs

58.145.187.246 185.128.235.174 177.8.117.102 128.124.10.67
91.237.107.108 31.173.86.38 174.250.144.244 174.250.144.245
2806:2f0:1000:5481:5eb1:3eff:fed4:694f 13.235.255.65 3.122.226.37 3.239.113.159
35.182.97.107 95.217.3.245 185.95.85.156 69.65.59.71
23.247.75.101 195.62.46.162 195.62.46.164 160.120.172.206