Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.138.91.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.138.91.21.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:53:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
21.91.138.159.in-addr.arpa domain name pointer ecs-159-138-91-21.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.91.138.159.in-addr.arpa	name = ecs-159-138-91-21.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.220.19.179 attack
1597981804 - 08/21/2020 05:50:04 Host: 95.220.19.179/95.220.19.179 Port: 445 TCP Blocked
2020-08-21 19:20:38
180.249.166.125 attackspambots
Failed password for invalid user yang from 180.249.166.125 port 9809 ssh2
2020-08-21 19:08:31
218.4.240.194 attack
Fail2Ban Ban Triggered
2020-08-21 19:00:47
162.243.130.29 attackspam
404 NOT FOUND
2020-08-21 19:18:44
103.98.131.37 attackbots
Invalid user louis from 103.98.131.37 port 58114
2020-08-21 18:41:47
62.234.74.168 attackbotsspam
Invalid user svnuser from 62.234.74.168 port 47202
2020-08-21 18:46:29
209.17.97.98 attack
TCP port : 8888
2020-08-21 18:49:42
124.104.28.99 attack
firewall-block, port(s): 445/tcp
2020-08-21 19:13:41
1.34.62.47 attackbots
firewall-block, port(s): 23/tcp
2020-08-21 19:24:06
94.191.83.249 attack
Aug 21 06:38:20 NPSTNNYC01T sshd[29798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.83.249
Aug 21 06:38:23 NPSTNNYC01T sshd[29798]: Failed password for invalid user myuser from 94.191.83.249 port 46390 ssh2
Aug 21 06:42:36 NPSTNNYC01T sshd[30137]: Failed password for root from 94.191.83.249 port 36472 ssh2
...
2020-08-21 18:54:42
42.200.228.80 attackbotsspam
Automatic report - Port Scan Attack
2020-08-21 19:16:20
213.217.1.38 attackbotsspam
firewall-block, port(s): 56359/tcp
2020-08-21 19:03:06
58.229.208.176 attackbots
Aug 21 03:30:47 propaganda sshd[19416]: Connection from 58.229.208.176 port 56088 on 10.0.0.161 port 22 rdomain ""
Aug 21 03:30:48 propaganda sshd[19416]: Connection closed by 58.229.208.176 port 56088 [preauth]
2020-08-21 18:59:37
129.211.45.88 attackbotsspam
$f2bV_matches
2020-08-21 18:43:29
183.110.223.149 attackspambots
 TCP (SYN) 183.110.223.149:45773 -> port 8634, len 44
2020-08-21 19:06:49

Recently Reported IPs

176.70.10.253 13.8.21.158 211.234.54.106 12.56.87.81
194.192.6.109 251.80.189.23 169.45.219.89 135.111.233.89
173.131.114.117 84.193.165.56 152.105.32.251 234.105.218.54
172.145.114.160 10.118.196.207 149.12.34.143 114.29.86.209
250.167.210.79 141.80.108.62 159.36.108.62 176.73.210.58