Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Clapham

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Virgin Media Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.21.169.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11483
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.21.169.241.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 10 02:20:23 CST 2019
;; MSG SIZE  rcvd: 117

Host info
241.169.21.82.in-addr.arpa domain name pointer cpc110791-lewi20-2-0-cust496.2-4.cable.virginm.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
241.169.21.82.in-addr.arpa	name = cpc110791-lewi20-2-0-cust496.2-4.cable.virginm.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.144.14.233 attack
Failed log in attempt
2022-06-25 03:25:18
185.63.253.200 spambotsattackproxynormal
185.63.253.200
2022-07-06 18:19:36
185.63.253.00 spambotsattackproxynormal
185.63.253.200
2022-07-06 18:19:25
66.254.114.38 attack
DDoS
2022-07-07 21:52:15
185.63.253.200 normal
Video bokep
2022-06-06 15:40:12
5.34.204.195 spam
ATAQUE SPAM
2022-06-06 20:29:17
185.63.253.200 spambotsattackproxynormal
Jdjejxjxjs
2022-06-12 04:06:29
103.218.27.171 spam
SPAM, like Email Spam, Web Spam.
help me In Normal IP please?
My email address is: mdasrafulalomkamil@gmail.com
2022-07-11 18:28:13
217.179.203.116 normal
United Kingdom, school PC.
2022-06-16 18:47:00
141.98.11.61 attack
Scan port
2022-07-04 12:56:10
165.225.121.6 proxynormal
internet not fast , please data 5 mb is not work
2022-06-16 18:36:05
45.95.147.10 attack
Port Scan
2022-06-28 12:54:25
194.5.53.152 spamattack
acceso a privacidad de cuenta personal
2022-07-03 23:05:06
167.99.199.98 attack
Jul  3 05:29:37 hostname sshd[1529575]: pam_unix(sshd:auth): check pass; user unknown
Jul  3 05:29:37 hostname sshd[1529575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.199.98
Jul  3 05:29:37 hostname sshd[1529571]: Invalid user bmp from 167.99.199.98 port 43148
Jul  3 05:29:37 hostname sshd[1529571]: pam_unix(sshd:auth): check pass; user unknown
Jul  3 05:29:37 hostname sshd[1529571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.199.98
Jul  3 05:29:37 hostname sshd[1529578]: Invalid user centos from 167.99.199.98 port 44110
Jul  3 05:29:37 hostname sshd[1529578]: pam_unix(sshd:auth): check pass; user unknown
Jul  3 05:29:37 hostname sshd[1529578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.199.98
Jul  3 05:29:37 hostname sshd[1529567]: Invalid user amandabackup from 167.99.199.98 port 42380
Jul  3 05:29:37 hostname sshd[1529567]: pam_unix(sshd:auth): check pass; user unknown
Jul  3 05:29:37 hostname sshd[1529567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.199.98
Jul  3 05:29:37 hostname sshd[1529558]: Invalid user admin from 167.99.199.98 port 41420
2022-07-05 20:15:58
68.183.41.140 attack
Unauthorized login attempt to wordpress
2022-06-18 13:22:09

Recently Reported IPs

213.9.217.52 138.148.67.251 73.56.42.81 166.221.175.164
188.165.179.8 53.50.251.76 95.153.227.233 208.247.91.218
190.249.158.128 36.62.242.180 150.134.233.89 94.59.192.55
79.226.119.223 70.117.45.171 95.38.212.108 101.81.216.194
212.236.157.38 222.245.58.178 88.107.190.41 121.91.9.187