Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.26.108.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.26.108.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 11:15:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 164.108.26.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.108.26.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.92.43.106 attack
2020-04-06T06:49:08.088558vps751288.ovh.net sshd\[15648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.43.106  user=root
2020-04-06T06:49:09.966724vps751288.ovh.net sshd\[15648\]: Failed password for root from 120.92.43.106 port 5756 ssh2
2020-04-06T06:53:53.699370vps751288.ovh.net sshd\[15682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.43.106  user=root
2020-04-06T06:53:55.371623vps751288.ovh.net sshd\[15682\]: Failed password for root from 120.92.43.106 port 64936 ssh2
2020-04-06T06:58:40.097027vps751288.ovh.net sshd\[15726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.43.106  user=root
2020-04-06 15:04:39
36.84.113.120 attackbots
1586145242 - 04/06/2020 05:54:02 Host: 36.84.113.120/36.84.113.120 Port: 445 TCP Blocked
2020-04-06 15:32:31
45.133.99.6 attack
Apr  6 09:21:36 websrv1.derweidener.de postfix/smtpd[2296605]: warning: unknown[45.133.99.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:21:36 websrv1.derweidener.de postfix/smtpd[2296605]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:21:42 websrv1.derweidener.de postfix/smtpd[2296588]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:21:50 websrv1.derweidener.de postfix/smtpd[2296243]: lost connection after AUTH from unknown[45.133.99.6]
Apr  6 09:22:00 websrv1.derweidener.de postfix/smtpd[2296605]: warning: unknown[45.133.99.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-06 15:56:17
46.229.168.140 attackbots
inbound access attempt
2020-04-06 15:41:45
191.13.215.183 attackbotsspam
Automatic report BANNED IP
2020-04-06 15:53:47
47.252.6.231 attack
Wordpress login scanning
2020-04-06 15:17:51
115.159.149.136 attackspambots
Apr  6 02:58:02 Tower sshd[7229]: Connection from 115.159.149.136 port 59342 on 192.168.10.220 port 22 rdomain ""
Apr  6 02:58:14 Tower sshd[7229]: Failed password for root from 115.159.149.136 port 59342 ssh2
Apr  6 02:58:17 Tower sshd[7229]: Received disconnect from 115.159.149.136 port 59342:11: Bye Bye [preauth]
Apr  6 02:58:17 Tower sshd[7229]: Disconnected from authenticating user root 115.159.149.136 port 59342 [preauth]
2020-04-06 15:02:04
202.175.250.219 attackbotsspam
Apr  6 08:28:19 archiv sshd[29168]: Address 202.175.250.219 maps to 219.250.175.202.static.eastern-tele.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Apr  6 08:28:19 archiv sshd[29168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.250.219  user=r.r
Apr  6 08:28:21 archiv sshd[29168]: Failed password for r.r from 202.175.250.219 port 49066 ssh2
Apr  6 08:28:21 archiv sshd[29168]: Received disconnect from 202.175.250.219 port 49066:11: Bye Bye [preauth]
Apr  6 08:28:21 archiv sshd[29168]: Disconnected from 202.175.250.219 port 49066 [preauth]
Apr  6 08:48:03 archiv sshd[29600]: Address 202.175.250.219 maps to 219.250.175.202.static.eastern-tele.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Apr  6 08:48:03 archiv sshd[29600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.250.219  user=r.r
Apr  6 08:48:05 archiv ssh........
-------------------------------
2020-04-06 15:25:53
159.203.166.132 attackspambots
(smtpauth) Failed SMTP AUTH login from 159.203.166.132 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-06 08:24:02 login authenticator failed for (ADMIN) [159.203.166.132]: 535 Incorrect authentication data (set_id=info@tookatarh.com)
2020-04-06 15:26:29
46.101.199.212 attack
$f2bV_matches
2020-04-06 15:01:33
148.72.232.94 attack
$f2bV_matches
2020-04-06 15:25:02
162.243.132.87 attackspambots
Honeypot hit.
2020-04-06 15:14:20
206.189.139.179 attack
Apr  6 06:22:04 vps647732 sshd[17056]: Failed password for root from 206.189.139.179 port 33206 ssh2
...
2020-04-06 15:40:01
195.231.8.141 attack
2020-04-06T07:10:56.154579abusebot-2.cloudsearch.cf sshd[25974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.8.141  user=root
2020-04-06T07:10:58.701946abusebot-2.cloudsearch.cf sshd[25974]: Failed password for root from 195.231.8.141 port 33384 ssh2
2020-04-06T07:11:14.055324abusebot-2.cloudsearch.cf sshd[25990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.8.141  user=root
2020-04-06T07:11:15.741160abusebot-2.cloudsearch.cf sshd[25990]: Failed password for root from 195.231.8.141 port 53662 ssh2
2020-04-06T07:11:31.824160abusebot-2.cloudsearch.cf sshd[26006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.8.141  user=root
2020-04-06T07:11:34.177499abusebot-2.cloudsearch.cf sshd[26006]: Failed password for root from 195.231.8.141 port 45604 ssh2
2020-04-06T07:11:49.573542abusebot-2.cloudsearch.cf sshd[26022]: pam_unix(sshd:auth): authe
...
2020-04-06 15:17:14
119.40.33.22 attackspam
ssh brute force
2020-04-06 15:09:20

Recently Reported IPs

114.226.213.117 167.208.139.117 255.183.0.186 30.132.124.252
221.65.68.121 126.26.106.197 231.193.14.188 54.194.125.157
38.115.75.102 13.37.12.255 10.37.128.34 249.162.64.82
135.71.149.190 108.44.29.189 66.255.229.241 221.5.31.241
58.47.238.127 46.247.213.13 194.52.134.89 230.75.135.93