Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.21.124.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.21.124.140.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070101 1800 900 604800 86400

;; Query time: 485 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 01 16:20:27 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 140.124.21.34.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.124.21.34.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
141.98.9.162 attackbots
SSH Remote Login Attempt Banned
2020-10-10 22:43:59
165.227.95.163 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 4191 32610
2020-10-10 22:29:22
195.95.215.157 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-10-10 22:21:43
94.102.50.183 attackspambots
Sep 14 04:05:17 *hidden* postfix/postscreen[17355]: DNSBL rank 3 for [94.102.50.183]:62951
2020-10-10 22:26:06
78.42.135.172 attack
(sshd) Failed SSH login from 78.42.135.172 (DE/Germany/HSI-KBW-078-042-135-172.hsi3.kabel-badenwuerttemberg.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 03:12:56 optimus sshd[23317]: Failed password for root from 78.42.135.172 port 51528 ssh2
Oct 10 03:26:44 optimus sshd[28533]: Failed password for mail from 78.42.135.172 port 55242 ssh2
Oct 10 03:34:36 optimus sshd[31500]: Invalid user guest from 78.42.135.172
Oct 10 03:34:39 optimus sshd[31500]: Failed password for invalid user guest from 78.42.135.172 port 60072 ssh2
Oct 10 03:42:07 optimus sshd[1486]: Failed password for root from 78.42.135.172 port 36634 ssh2
2020-10-10 22:17:25
117.51.150.202 attackbotsspam
SSH login attempts.
2020-10-10 22:39:08
193.112.48.79 attack
Invalid user alex from 193.112.48.79 port 41933
2020-10-10 22:31:54
94.102.54.246 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-10 22:20:48
89.248.168.112 attackbots
firewall-block, port(s): 5269/tcp
2020-10-10 22:40:01
64.92.135.50 attackspam
Unauthorized admin access - /admin/css/datepicker.css?v=913-new-social-iconsb0e0262bab05c9f5
2020-10-10 22:37:01
45.227.255.208 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-10T10:19:18Z and 2020-10-10T11:05:55Z
2020-10-10 22:38:15
2.57.122.171 attackbotsspam
Port Scan
...
2020-10-10 22:33:16
94.102.50.176 attackspambots
Sep 9 17:08:32 *hidden* postfix/postscreen[28795]: DNSBL rank 3 for [94.102.50.176]:52261
2020-10-10 22:27:10
58.230.147.230 attackspam
SSH Brute-force
2020-10-10 22:24:07
141.98.9.165 attackbots
Invalid user user from 141.98.9.165 port 42841
2020-10-10 23:00:27

Recently Reported IPs

146.130.236.181 82.214.77.192 187.86.229.102 212.221.243.152
38.150.158.195 183.173.128.139 198.142.178.134 128.113.203.211
170.208.42.9 151.1.138.140 67.128.214.6 124.30.10.208
186.114.23.5 167.86.255.64 105.162.18.97 103.137.163.173
209.162.190.196 8.108.214.57 187.198.219.53 209.61.126.204