Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pigeon

Region: Michigan

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.91.14.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.91.14.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 08:28:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
134.14.91.121.in-addr.arpa domain name pointer 121-91-14-134.avci.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.14.91.121.in-addr.arpa	name = 121-91-14-134.avci.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.175.217.96 attackspam
Exploited Host.
2020-07-26 03:32:39
54.39.215.32 attackbots
 UDP 54.39.215.32:38345 -> port 5093, len 35
2020-07-26 03:48:04
222.168.18.227 attack
SSH invalid-user multiple login attempts
2020-07-26 03:51:00
134.175.197.158 attackspambots
Exploited Host.
2020-07-26 03:34:18
103.90.233.35 attack
Jul 25 15:28:08 r.ca sshd[7635]: Failed password for invalid user zhaoyang from 103.90.233.35 port 48302 ssh2
2020-07-26 03:52:44
128.199.62.182 attack
2020-07-25T22:11:37.814117hostname sshd[89698]: Failed password for invalid user ang from 128.199.62.182 port 53090 ssh2
...
2020-07-26 03:38:04
134.122.72.221 attackbotsspam
2020-07-25T04:01:56.999875hostname sshd[73666]: Failed password for invalid user elastic from 134.122.72.221 port 41534 ssh2
...
2020-07-26 03:36:46
18.212.119.137 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ec2-18-212-119-137.compute-1.amazonaws.com.
2020-07-26 03:36:03
129.211.62.194 attackbotsspam
Exploited Host.
2020-07-26 03:58:03
207.231.106.10 attackspambots
 TCP (SYN) 207.231.106.10:42264 -> port 8443, len 44
2020-07-26 03:56:54
220.233.114.211 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-26 04:03:59
13.233.214.131 attackbotsspam
Exploited Host.
2020-07-26 03:47:37
222.186.180.130 attackspam
Jul 25 21:09:03 minden010 sshd[17674]: Failed password for root from 222.186.180.130 port 38191 ssh2
Jul 25 21:09:05 minden010 sshd[17674]: Failed password for root from 222.186.180.130 port 38191 ssh2
Jul 25 21:09:07 minden010 sshd[17674]: Failed password for root from 222.186.180.130 port 38191 ssh2
...
2020-07-26 03:31:40
134.122.52.69 attack
Exploited Host.
2020-07-26 03:37:47
129.204.80.188 attackspam
Exploited Host.
2020-07-26 04:03:21

Recently Reported IPs

50.49.91.174 115.204.182.87 174.250.164.91 238.4.131.236
45.4.208.66 78.120.212.132 87.98.220.2 132.242.153.52
254.142.40.57 75.4.143.37 3.105.222.237 164.172.81.193
125.3.31.47 7.165.101.95 43.98.70.239 55.122.179.97
138.157.48.59 211.233.254.46 137.220.24.29 185.104.50.28