Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.128.157.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.128.157.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 03:23:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.157.128.95.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.157.128.95.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.200.126.162 attackspam
Web Attack: Netgear Router Authentication Bypass
2020-05-28 06:20:17
210.16.187.206 attackspam
Invalid user megan from 210.16.187.206 port 53723
2020-05-28 06:19:38
51.75.121.252 attack
May 27 23:59:58 piServer sshd[6120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.121.252 
May 28 00:00:00 piServer sshd[6120]: Failed password for invalid user karen from 51.75.121.252 port 33184 ssh2
May 28 00:04:51 piServer sshd[6855]: Failed password for root from 51.75.121.252 port 54848 ssh2
...
2020-05-28 06:42:37
102.139.89.111 attack
Unauthorized connection attempt from IP address 102.139.89.111 on Port 445(SMB)
2020-05-28 06:44:17
104.244.74.181 attackbotsspam
Tor exit node
2020-05-28 06:18:29
210.14.77.102 attack
May 28 00:18:10  sshd\[23068\]: User root from 210.14.77.102 not allowed because not listed in AllowUsersMay 28 00:18:12  sshd\[23068\]: Failed password for invalid user root from 210.14.77.102 port 62912 ssh2
...
2020-05-28 06:21:40
171.99.155.18 attack
get
2020-05-28 06:26:36
45.188.1.134 attack
Unauthorized connection attempt from IP address 45.188.1.134 on Port 445(SMB)
2020-05-28 06:47:14
182.180.128.132 attackspam
May 27 08:18:27 : SSH login attempts with invalid user
2020-05-28 06:27:03
194.105.137.173 attackspambots
20/5/27@14:17:21: FAIL: Alarm-Network address from=194.105.137.173
...
2020-05-28 06:24:53
45.178.1.45 attack
Unauthorized connection attempt from IP address 45.178.1.45 on Port 445(SMB)
2020-05-28 06:50:17
36.238.102.70 attackbotsspam
Port probing on unauthorized port 2323
2020-05-28 06:19:03
156.234.168.125 attackspambots
May 27 22:24:44 : SSH login attempts with invalid user
2020-05-28 06:48:13
198.98.58.23 attackbotsspam
Tor exit node
2020-05-28 06:33:54
193.56.28.146 attack
2020-05-28 00:11:41 dovecot_login authenticator failed for \(User\) \[193.56.28.146\]: 535 Incorrect authentication data \(set_id=shop3@ift.org.ua\)2020-05-28 00:11:47 dovecot_login authenticator failed for \(User\) \[193.56.28.146\]: 535 Incorrect authentication data \(set_id=shop3@ift.org.ua\)2020-05-28 00:11:57 dovecot_login authenticator failed for \(User\) \[193.56.28.146\]: 535 Incorrect authentication data \(set_id=shop3@ift.org.ua\)
...
2020-05-28 06:22:54

Recently Reported IPs

133.4.21.82 248.117.92.9 175.145.116.22 165.104.109.53
229.30.229.106 2.25.26.136 214.64.181.132 103.238.52.167
55.125.66.109 241.123.160.131 227.206.42.102 114.25.192.36
107.137.110.237 76.87.180.77 18.47.179.223 56.125.181.233
150.163.123.194 74.126.199.232 18.146.165.230 231.154.192.71