Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dayton

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.134.21.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;135.134.21.189.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 13:27:12 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 189.21.134.135.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.21.134.135.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.21.117.250 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-04-01 05:06:03
111.229.39.187 attack
Brute force SMTP login attempted.
...
2020-04-01 05:44:24
171.118.221.81 attackbots
Unauthorized connection attempt detected from IP address 171.118.221.81 to port 23 [T]
2020-04-01 05:14:55
121.33.238.218 attackbots
Unauthorized connection attempt detected from IP address 121.33.238.218 to port 7001 [T]
2020-04-01 05:18:07
111.229.48.106 attackbots
Brute force SMTP login attempted.
...
2020-04-01 05:42:57
96.114.71.147 attack
Mar 31 21:21:45 localhost sshd[34886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
Mar 31 21:21:47 localhost sshd[34886]: Failed password for root from 96.114.71.147 port 38536 ssh2
Mar 31 21:26:49 localhost sshd[35364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
Mar 31 21:26:51 localhost sshd[35364]: Failed password for root from 96.114.71.147 port 50756 ssh2
Mar 31 21:31:39 localhost sshd[35850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.114.71.147  user=root
Mar 31 21:31:41 localhost sshd[35850]: Failed password for root from 96.114.71.147 port 34746 ssh2
...
2020-04-01 05:38:51
211.60.3.9 attackspam
Unauthorized connection attempt detected from IP address 211.60.3.9 to port 4567 [T]
2020-04-01 05:10:36
106.12.108.170 attackbotsspam
Mar 31 23:29:03 vps647732 sshd[22191]: Failed password for root from 106.12.108.170 port 46266 ssh2
...
2020-04-01 05:33:20
111.229.78.120 attackspambots
Brute force SMTP login attempted.
...
2020-04-01 05:34:23
202.17.144.47 attack
Unauthorized connection attempt detected from IP address 202.17.144.47 to port 23 [T]
2020-04-01 05:11:18
180.177.77.98 attackbotsspam
Unauthorized connection attempt detected from IP address 180.177.77.98 to port 9530 [T]
2020-04-01 05:13:12
223.15.157.134 attackbotsspam
Unauthorized connection attempt detected from IP address 223.15.157.134 to port 23 [T]
2020-04-01 05:07:50
51.81.113.17 attackspambots
SpamScore above: 10.0
2020-04-01 05:41:06
89.122.21.239 attackspam
Automatic report - Port Scan Attack
2020-04-01 05:39:14
42.227.55.209 attack
Unauthorized connection attempt detected from IP address 42.227.55.209 to port 23 [T]
2020-04-01 05:30:23

Recently Reported IPs

34.47.107.5 219.65.207.23 57.238.1.31 58.201.164.180
199.238.25.229 213.44.71.44 132.127.41.121 194.81.119.125
138.175.184.243 222.229.67.52 65.179.182.181 161.54.41.147
81.46.38.152 180.94.168.9 40.201.10.219 180.64.142.45
209.138.251.67 164.176.197.91 171.192.159.48 115.8.52.249