Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.21.250.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42163
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.21.250.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 00:43:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 91.250.21.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.250.21.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
78.165.233.7 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:23:38
129.204.58.180 attackbotsspam
Nov 20 04:12:24 mail sshd\[63792\]: Invalid user zhr from 129.204.58.180
Nov 20 04:12:24 mail sshd\[63792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.58.180
...
2019-11-20 22:36:39
2408:8207:8473:8640:fd82:ea2e:a46f:8b5c attackbots
badbot
2019-11-20 22:22:04
142.44.196.225 attackspam
no
2019-11-20 22:39:22
119.85.7.24 attackbotsspam
badbot
2019-11-20 22:16:13
218.92.0.168 attack
detected by Fail2Ban
2019-11-20 22:45:08
114.105.187.20 attack
badbot
2019-11-20 22:18:14
115.213.170.199 attack
badbot
2019-11-20 22:37:15
45.234.193.43 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:29:08
223.17.179.90 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:38:58
60.188.44.118 attack
badbot
2019-11-20 22:17:16
2.139.176.35 attack
Invalid user guest from 2.139.176.35 port 8324
2019-11-20 22:10:42
222.186.180.147 attack
[ssh] SSH attack
2019-11-20 22:49:36
42.117.228.109 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-20 22:34:00
198.23.251.238 attack
Nov 20 19:47:02 gw1 sshd[10884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.251.238
Nov 20 19:47:04 gw1 sshd[10884]: Failed password for invalid user 1234 from 198.23.251.238 port 56826 ssh2
...
2019-11-20 22:50:33

Recently Reported IPs

133.95.157.136 199.15.225.9 118.244.190.26 160.142.221.209
186.205.141.23 7.47.191.79 28.84.178.1 98.159.202.141
80.219.31.158 48.235.39.115 153.133.179.104 67.239.248.117
133.81.185.115 209.251.53.3 67.225.222.207 21.127.192.183
58.228.11.80 130.54.247.249 234.81.232.14 64.188.206.29