Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.40.134.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.40.134.169.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:24:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
169.134.40.126.in-addr.arpa domain name pointer softbank126040134169.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.134.40.126.in-addr.arpa	name = softbank126040134169.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.48.116.82 attackspam
Jul 21 14:54:54 aat-srv002 sshd[20477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.116.82
Jul 21 14:54:55 aat-srv002 sshd[20477]: Failed password for invalid user projetecno from 103.48.116.82 port 59244 ssh2
Jul 21 15:04:36 aat-srv002 sshd[20683]: Failed password for root from 103.48.116.82 port 55882 ssh2
...
2019-07-22 05:23:36
5.196.72.58 attack
Invalid user user from 5.196.72.58 port 57430
2019-07-22 05:44:00
14.207.175.92 attackspambots
Sun, 21 Jul 2019 18:28:10 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:49:50
190.233.15.220 attackbots
Sun, 21 Jul 2019 18:28:18 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:24:48
191.103.45.82 attackbotsspam
Autoban   191.103.45.82 AUTH/CONNECT
2019-07-22 05:08:52
14.251.143.133 attackspam
Sun, 21 Jul 2019 18:28:10 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:49:18
62.216.61.39 attackspam
Sun, 21 Jul 2019 18:28:23 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:11:06
178.128.201.224 attackspam
Jul 21 20:22:44 tux-35-217 sshd\[11084\]: Invalid user wy from 178.128.201.224 port 35058
Jul 21 20:22:44 tux-35-217 sshd\[11084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.201.224
Jul 21 20:22:46 tux-35-217 sshd\[11084\]: Failed password for invalid user wy from 178.128.201.224 port 35058 ssh2
Jul 21 20:28:11 tux-35-217 sshd\[11090\]: Invalid user simo from 178.128.201.224 port 58568
Jul 21 20:28:11 tux-35-217 sshd\[11090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.201.224
...
2019-07-22 05:39:44
103.224.48.51 attack
Sun, 21 Jul 2019 18:28:19 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:21:29
190.43.228.185 attack
Autoban   190.43.228.185 AUTH/CONNECT
2019-07-22 05:44:48
190.42.17.7 attackbotsspam
Autoban   190.42.17.7 AUTH/CONNECT
2019-07-22 05:48:32
190.99.135.114 attackbots
Autoban   190.99.135.114 AUTH/CONNECT
2019-07-22 05:11:33
190.85.187.245 attackbotsspam
Autoban   190.85.187.245 AUTH/CONNECT
2019-07-22 05:15:55
190.41.205.155 attackbots
Autoban   190.41.205.155 AUTH/CONNECT
2019-07-22 05:50:17
87.120.220.111 attackspam
Sun, 21 Jul 2019 18:28:15 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-22 05:35:08

Recently Reported IPs

113.232.191.217 191.98.196.15 109.48.192.30 103.135.211.143
185.162.30.183 115.193.125.80 79.127.108.39 43.154.123.204
77.157.50.1 121.199.6.111 34.90.48.212 183.251.16.211
218.93.162.171 188.225.126.188 116.53.166.86 110.139.56.245
194.158.73.254 95.52.77.71 78.181.188.71 178.219.120.159