Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.0.26.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.0.26.34.			IN	A

;; AUTHORITY SECTION:
.			80	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:47:41 CST 2022
;; MSG SIZE  rcvd: 104
Host info
34.26.0.134.in-addr.arpa domain name pointer vsrv48524.customer.xenway.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.26.0.134.in-addr.arpa	name = vsrv48524.customer.xenway.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.128.180.118 attack
Sep 15 14:06:33 hpm sshd\[25409\]: Invalid user ctrls from 220.128.180.118
Sep 15 14:06:33 hpm sshd\[25409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-128-180-118.hinet-ip.hinet.net
Sep 15 14:06:35 hpm sshd\[25409\]: Failed password for invalid user ctrls from 220.128.180.118 port 14870 ssh2
Sep 15 14:15:45 hpm sshd\[26335\]: Invalid user cw from 220.128.180.118
Sep 15 14:15:45 hpm sshd\[26335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-128-180-118.hinet-ip.hinet.net
2019-09-16 08:23:19
49.88.112.114 attackspam
Sep 16 01:39:10 cvbnet sshd[4100]: Failed password for root from 49.88.112.114 port 33427 ssh2
Sep 16 01:39:14 cvbnet sshd[4100]: Failed password for root from 49.88.112.114 port 33427 ssh2
2019-09-16 08:05:39
218.161.79.19 attackspambots
Reported by AbuseIPDB proxy server.
2019-09-16 08:18:31
94.198.110.205 attackspam
Sep 16 00:07:08 game-panel sshd[14509]: Failed password for www-data from 94.198.110.205 port 36044 ssh2
Sep 16 00:11:21 game-panel sshd[14698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.198.110.205
Sep 16 00:11:23 game-panel sshd[14698]: Failed password for invalid user par0t from 94.198.110.205 port 58350 ssh2
2019-09-16 08:13:35
113.128.65.229 attackspambots
Sep 14 01:52:41 tux postfix/smtpd[17435]: connect from unknown[113.128.65.229]
Sep x@x
Sep 14 01:52:43 tux postfix/smtpd[17435]: lost connection after RCPT from unknown[113.128.65.229]
Sep 14 01:52:43 tux postfix/smtpd[17435]: disconnect from unknown[113.128.65.229]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.128.65.229
2019-09-16 08:18:10
84.121.165.180 attack
Sep 16 02:58:24 taivassalofi sshd[69647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.121.165.180
Sep 16 02:58:26 taivassalofi sshd[69647]: Failed password for invalid user nova from 84.121.165.180 port 37520 ssh2
...
2019-09-16 08:02:20
54.37.71.235 attackspam
Sep 16 01:48:15 OPSO sshd\[5116\]: Invalid user User2 from 54.37.71.235 port 39277
Sep 16 01:48:15 OPSO sshd\[5116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235
Sep 16 01:48:17 OPSO sshd\[5116\]: Failed password for invalid user User2 from 54.37.71.235 port 39277 ssh2
Sep 16 01:53:45 OPSO sshd\[6580\]: Invalid user seilhoise from 54.37.71.235 port 35108
Sep 16 01:53:45 OPSO sshd\[6580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235
2019-09-16 08:09:30
154.124.209.185 attackspambots
scan z
2019-09-16 08:30:05
218.92.0.135 attackspambots
SSH Brute Force
2019-09-16 08:28:35
45.32.42.160 attackspam
Sep 14 01:15:03 xb3 sshd[24177]: reveeclipse mapping checking getaddrinfo for 45.32.42.160.vultr.com [45.32.42.160] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 14 01:15:04 xb3 sshd[24177]: Failed password for invalid user kwame from 45.32.42.160 port 51144 ssh2
Sep 14 01:15:05 xb3 sshd[24177]: Received disconnect from 45.32.42.160: 11: Bye Bye [preauth]
Sep 14 01:33:14 xb3 sshd[19504]: reveeclipse mapping checking getaddrinfo for 45.32.42.160.vultr.com [45.32.42.160] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 14 01:33:16 xb3 sshd[19504]: Failed password for invalid user ubnt from 45.32.42.160 port 36558 ssh2
Sep 14 01:33:17 xb3 sshd[19504]: Received disconnect from 45.32.42.160: 11: Bye Bye [preauth]
Sep 14 01:37:40 xb3 sshd[17195]: reveeclipse mapping checking getaddrinfo for 45.32.42.160.vultr.com [45.32.42.160] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep 14 01:37:41 xb3 sshd[17195]: Failed password for invalid user member from 45.32.42.160 port 53738 ssh2
Sep 14 01:37:41 xb3 ss........
-------------------------------
2019-09-16 08:01:12
51.38.80.173 attack
Sep 15 14:04:27 php1 sshd\[9549\]: Invalid user batuhan from 51.38.80.173
Sep 15 14:04:27 php1 sshd\[9549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu
Sep 15 14:04:28 php1 sshd\[9549\]: Failed password for invalid user batuhan from 51.38.80.173 port 35416 ssh2
Sep 15 14:08:29 php1 sshd\[10015\]: Invalid user master from 51.38.80.173
Sep 15 14:08:29 php1 sshd\[10015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.ip-51-38-80.eu
2019-09-16 08:20:38
103.101.49.6 attackbots
Sep 16 02:15:32 dedicated sshd[1505]: Invalid user administrator from 103.101.49.6 port 41680
2019-09-16 08:21:36
176.79.170.164 attackspambots
Sep 15 13:52:05 sachi sshd\[16174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-170-164.bl27.telepac.pt  user=root
Sep 15 13:52:07 sachi sshd\[16174\]: Failed password for root from 176.79.170.164 port 52331 ssh2
Sep 15 13:56:39 sachi sshd\[16562\]: Invalid user jewish from 176.79.170.164
Sep 15 13:56:39 sachi sshd\[16562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl-170-164.bl27.telepac.pt
Sep 15 13:56:41 sachi sshd\[16562\]: Failed password for invalid user jewish from 176.79.170.164 port 46853 ssh2
2019-09-16 08:02:04
182.61.21.197 attack
Sep 15 13:50:27 sachi sshd\[16042\]: Invalid user ctakes from 182.61.21.197
Sep 15 13:50:27 sachi sshd\[16042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.197
Sep 15 13:50:29 sachi sshd\[16042\]: Failed password for invalid user ctakes from 182.61.21.197 port 54688 ssh2
Sep 15 13:54:43 sachi sshd\[16390\]: Invalid user odroid from 182.61.21.197
Sep 15 13:54:43 sachi sshd\[16390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.197
2019-09-16 08:07:44
92.9.218.138 attack
ssh failed login
2019-09-16 08:13:15

Recently Reported IPs

134.0.41.206 134.0.41.48 134.0.41.25 134.0.42.170
134.0.42.235 134.0.43.15 118.172.95.1 134.0.61.202
134.0.78.4 134.0.8.103 134.0.63.148 134.0.63.156
134.0.8.131 134.0.8.13 134.0.63.98 134.0.8.130
134.0.8.144 134.0.8.141 134.0.8.145 118.172.95.115