Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.21.114.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.21.114.247.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:49:38 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 247.114.21.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 247.114.21.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.205.68.83 attackbotsspam
Jun 27 08:41:03 Tower sshd[20539]: Connection from 89.205.68.83 port 43080 on 192.168.10.220 port 22 rdomain ""
Jun 27 08:41:05 Tower sshd[20539]: Invalid user suporte from 89.205.68.83 port 43080
Jun 27 08:41:05 Tower sshd[20539]: error: Could not get shadow information for NOUSER
Jun 27 08:41:05 Tower sshd[20539]: Failed password for invalid user suporte from 89.205.68.83 port 43080 ssh2
Jun 27 08:41:05 Tower sshd[20539]: Received disconnect from 89.205.68.83 port 43080:11: Bye Bye [preauth]
Jun 27 08:41:05 Tower sshd[20539]: Disconnected from invalid user suporte 89.205.68.83 port 43080 [preauth]
2020-06-27 22:58:25
183.129.107.54 attackbots
Jun 27 14:18:20 mxgate1 postfix/postscreen[27506]: CONNECT from [183.129.107.54]:61843 to [176.31.12.44]:25
Jun 27 14:18:20 mxgate1 postfix/dnsblog[27573]: addr 183.129.107.54 listed by domain zen.spamhaus.org as 127.0.0.3
Jun 27 14:18:20 mxgate1 postfix/dnsblog[27573]: addr 183.129.107.54 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 27 14:18:20 mxgate1 postfix/dnsblog[27573]: addr 183.129.107.54 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 27 14:18:20 mxgate1 postfix/dnsblog[27574]: addr 183.129.107.54 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 27 14:18:20 mxgate1 postfix/dnsblog[27576]: addr 183.129.107.54 listed by domain b.barracudacentral.org as 127.0.0.2
Jun 27 14:18:26 mxgate1 postfix/postscreen[27506]: DNSBL rank 4 for [183.129.107.54]:61843
Jun x@x
Jun 27 14:18:28 mxgate1 postfix/postscreen[27506]: DISCONNECT [183.129.107.54]:61843


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=183.129.107.54
2020-06-27 22:28:48
193.117.76.83 attackbots
firewall-block, port(s): 23/tcp
2020-06-27 22:46:22
218.92.0.252 attackspambots
2020-06-27T17:50:23.325793afi-git.jinr.ru sshd[18657]: Failed password for root from 218.92.0.252 port 14159 ssh2
2020-06-27T17:50:25.755406afi-git.jinr.ru sshd[18657]: Failed password for root from 218.92.0.252 port 14159 ssh2
2020-06-27T17:50:28.933552afi-git.jinr.ru sshd[18657]: Failed password for root from 218.92.0.252 port 14159 ssh2
2020-06-27T17:50:28.933660afi-git.jinr.ru sshd[18657]: error: maximum authentication attempts exceeded for root from 218.92.0.252 port 14159 ssh2 [preauth]
2020-06-27T17:50:28.933673afi-git.jinr.ru sshd[18657]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-27 22:56:23
155.4.212.96 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-06-27 22:54:39
219.73.2.214 attack
 TCP (SYN) 219.73.2.214:29329 -> port 23, len 40
2020-06-27 22:27:44
13.67.211.223 attackspambots
Jun 27 14:39:17 master sshd[2523]: Failed password for root from 13.67.211.223 port 21760 ssh2
Jun 27 14:48:31 master sshd[2547]: Failed password for invalid user cnm from 13.67.211.223 port 21760 ssh2
Jun 27 14:52:20 master sshd[2552]: Failed password for invalid user xbmc from 13.67.211.223 port 21760 ssh2
Jun 27 14:56:22 master sshd[2556]: Failed password for root from 13.67.211.223 port 21760 ssh2
Jun 27 15:08:32 master sshd[2579]: Failed password for root from 13.67.211.223 port 21760 ssh2
Jun 27 15:16:21 master sshd[2610]: Failed password for root from 13.67.211.223 port 21760 ssh2
Jun 27 15:20:21 master sshd[3029]: Failed password for invalid user lol from 13.67.211.223 port 21760 ssh2
2020-06-27 22:39:57
170.0.143.81 attackbots
port scan and connect, tcp 23 (telnet)
2020-06-27 22:21:28
167.71.146.220 attackspam
Fail2Ban Ban Triggered
2020-06-27 22:44:04
52.224.162.27 attackbots
Jun 27 14:14:09 srv-ubuntu-dev3 sshd[10420]: Invalid user testuser from 52.224.162.27
Jun 27 14:14:09 srv-ubuntu-dev3 sshd[10420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.162.27
Jun 27 14:14:09 srv-ubuntu-dev3 sshd[10420]: Invalid user testuser from 52.224.162.27
Jun 27 14:14:12 srv-ubuntu-dev3 sshd[10420]: Failed password for invalid user testuser from 52.224.162.27 port 1451 ssh2
Jun 27 14:17:42 srv-ubuntu-dev3 sshd[11202]: Invalid user testuser from 52.224.162.27
Jun 27 14:17:42 srv-ubuntu-dev3 sshd[11202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.162.27
Jun 27 14:17:42 srv-ubuntu-dev3 sshd[11202]: Invalid user testuser from 52.224.162.27
Jun 27 14:17:44 srv-ubuntu-dev3 sshd[11202]: Failed password for invalid user testuser from 52.224.162.27 port 7036 ssh2
Jun 27 14:20:31 srv-ubuntu-dev3 sshd[11781]: Invalid user testuser from 52.224.162.27
...
2020-06-27 22:37:06
185.134.29.246 attack
Email rejected due to spam filtering
2020-06-27 22:19:21
188.213.49.251 attackbotsspam
 UDP 188.213.49.251:48977 -> port 11211, len 44
2020-06-27 22:53:11
125.160.115.152 attack
Automatic report - Port Scan Attack
2020-06-27 22:34:43
120.132.124.179 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-27 22:41:46
212.124.19.10 attackbots
Email rejected due to spam filtering
2020-06-27 22:16:51

Recently Reported IPs

24.31.177.79 36.84.28.104 241.143.54.180 60.183.227.77
240.127.150.156 16.157.221.234 29.174.190.216 197.16.130.244
99.85.52.170 84.70.71.4 214.1.250.35 7.38.66.48
223.239.9.59 96.4.227.48 162.168.32.118 67.126.72.53
176.37.113.207 138.149.98.70 244.177.64.124 18.106.143.112