Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Georgetown

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.120.221.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47198
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.120.221.91.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 02:13:44 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 91.221.120.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 91.221.120.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
189.182.110.216 attackbots
445/tcp
[2019-07-01]1pkt
2019-07-02 04:36:55
212.83.145.12 attackspambots
\[2019-07-01 15:57:35\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T15:57:35.495-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="384011972592277524",SessionID="0x7f02f80e7688",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/50615",ACLName="no_extension_match"
\[2019-07-01 16:00:40\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T16:00:40.277-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="385011972592277524",SessionID="0x7f02f80bc158",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/53830",ACLName="no_extension_match"
\[2019-07-01 16:03:48\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T16:03:48.821-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="386011972592277524",SessionID="0x7f02f8066428",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.145.12/51194",ACL
2019-07-02 04:08:04
47.53.77.142 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 04:35:07
143.0.140.96 attackspam
SMTP Fraud Orders
2019-07-02 04:34:46
60.190.236.18 attackbotsspam
Unauthorized connection attempt from IP address 60.190.236.18 on Port 445(SMB)
2019-07-02 04:44:11
14.231.217.26 attackbots
Unauthorized connection attempt from IP address 14.231.217.26 on Port 445(SMB)
2019-07-02 04:46:37
49.83.23.248 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 04:51:06
182.253.175.10 attack
Unauthorized connection attempt from IP address 182.253.175.10 on Port 445(SMB)
2019-07-02 04:46:52
47.104.186.79 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 04:28:36
203.186.158.178 attackspam
SSH Brute-Force reported by Fail2Ban
2019-07-02 04:45:14
14.163.33.32 attackbotsspam
Unauthorized connection attempt from IP address 14.163.33.32 on Port 445(SMB)
2019-07-02 04:04:00
88.111.75.183 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-02 04:14:41
187.1.23.76 attack
libpam_shield report: forced login attempt
2019-07-02 04:04:51
195.254.135.18 attackbotsspam
C1,WP GET /humor/v1/wp-includes/wlwmanifest.xml
2019-07-02 04:00:28
167.250.96.131 attackbotsspam
libpam_shield report: forced login attempt
2019-07-02 04:50:39

Recently Reported IPs

116.203.100.225 37.247.9.200 36.70.211.45 160.210.116.3
163.61.16.158 12.88.221.246 100.40.76.101 163.152.234.134
76.190.44.179 108.84.125.188 220.245.147.131 51.174.39.135
63.18.247.246 211.97.1.59 202.101.110.69 202.95.136.150
105.138.132.159 202.195.112.106 105.226.111.93 112.237.3.40