Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.65.26.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.65.26.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:55:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 134.26.65.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 149.65.26.134.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
170.244.227.235 attack
Unauthorized connection attempt from IP address 170.244.227.235 on Port 445(SMB)
2020-10-11 10:08:33
113.23.144.50 attack
Oct  9 06:00:56 lola sshd[20524]: reveeclipse mapping checking getaddrinfo for shutcupid.com [113.23.144.50] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  9 06:00:56 lola sshd[20524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.23.144.50  user=r.r
Oct  9 06:00:58 lola sshd[20524]: Failed password for r.r from 113.23.144.50 port 50628 ssh2
Oct  9 06:00:58 lola sshd[20524]: Received disconnect from 113.23.144.50: 11: Bye Bye [preauth]
Oct  9 06:15:05 lola sshd[21030]: reveeclipse mapping checking getaddrinfo for shutcupid.com [113.23.144.50] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  9 06:15:05 lola sshd[21030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.23.144.50  user=r.r
Oct  9 06:15:06 lola sshd[21030]: Failed password for r.r from 113.23.144.50 port 49192 ssh2
Oct  9 06:15:07 lola sshd[21030]: Received disconnect from 113.23.144.50: 11: Bye Bye [preauth]
Oct  9 06:19:13 lola ssh........
-------------------------------
2020-10-11 10:24:37
45.143.221.101 attackspam
Scanned 1 times in the last 24 hours on port 80
2020-10-11 12:06:13
180.76.248.85 attack
Failed password for invalid user teacher from 180.76.248.85 port 58092 ssh2
2020-10-11 10:07:59
188.166.225.37 attack
Oct 11 02:45:35 vps-de sshd[7748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37 
Oct 11 02:45:38 vps-de sshd[7748]: Failed password for invalid user eillen from 188.166.225.37 port 51646 ssh2
Oct 11 02:48:22 vps-de sshd[7784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37  user=root
Oct 11 02:48:24 vps-de sshd[7784]: Failed password for invalid user root from 188.166.225.37 port 37072 ssh2
Oct 11 02:51:07 vps-de sshd[7819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37  user=root
Oct 11 02:51:09 vps-de sshd[7819]: Failed password for invalid user root from 188.166.225.37 port 50736 ssh2
...
2020-10-11 10:18:12
67.58.227.49 attackspam
1602362710 - 10/10/2020 22:45:10 Host: 67.58.227.49/67.58.227.49 Port: 23 TCP Blocked
2020-10-11 10:13:44
163.180.177.70 attackbots
Port Scan: TCP/443
2020-10-11 10:15:43
95.110.129.91 attackspambots
MYH,DEF GET /wp-login.php
2020-10-11 10:22:58
88.218.17.235 attack
Unauthorized connection attempt detected from IP address 88.218.17.235 to port 22
2020-10-11 12:04:04
89.178.18.43 attack
Port Scan: TCP/443
2020-10-11 10:26:56
185.63.253.200 attack
Open
2020-10-11 11:28:53
92.118.161.57 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 81 - port: 5351 proto: udp cat: Misc Attackbytes: 60
2020-10-11 12:03:47
82.65.166.65 attack
Automatic Fail2ban report - Trying login SSH
2020-10-11 10:27:14
119.196.116.211 attackbots
Port Scan: TCP/443
2020-10-11 10:09:38
179.144.140.183 attack
prod6
...
2020-10-11 10:03:38

Recently Reported IPs

170.189.47.25 107.155.180.2 218.160.187.47 127.50.167.236
128.141.214.198 146.150.56.47 21.116.129.60 250.165.107.3
171.236.150.37 163.129.208.247 249.67.246.162 27.2.188.192
248.71.98.222 95.199.200.111 203.181.99.63 253.125.88.113
170.230.43.237 227.24.179.134 93.155.211.102 228.33.226.204