Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 26.21.26.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;26.21.26.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:27:34 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 139.26.21.26.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.26.21.26.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.66.255.164 attack
Invalid user r00t from 217.66.255.164 port 62882
2020-05-23 17:23:23
186.14.55.215 attack
Invalid user administrator from 186.14.55.215 port 53605
2020-05-23 17:33:09
157.7.233.185 attackspam
<6 unauthorized SSH connections
2020-05-23 17:43:08
186.138.196.50 attack
Brute force attempt
2020-05-23 17:32:11
200.87.178.137 attack
May 23 09:08:56 ns382633 sshd\[13669\]: Invalid user dug from 200.87.178.137 port 42480
May 23 09:08:56 ns382633 sshd\[13669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
May 23 09:08:58 ns382633 sshd\[13669\]: Failed password for invalid user dug from 200.87.178.137 port 42480 ssh2
May 23 09:16:37 ns382633 sshd\[15317\]: Invalid user sbw from 200.87.178.137 port 60248
May 23 09:16:37 ns382633 sshd\[15317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137
2020-05-23 17:27:02
51.38.130.205 attack
Invalid user txl from 51.38.130.205 port 51772
2020-05-23 17:12:57
103.132.53.66 attackbots
Invalid user ubnt from 103.132.53.66 port 56207
2020-05-23 17:03:41
81.34.211.70 attackbotsspam
Invalid user bie from 81.34.211.70 port 39872
2020-05-23 17:08:53
54.36.98.129 attackspam
May 23 10:04:18 l03 sshd[21118]: Invalid user agy from 54.36.98.129 port 54566
...
2020-05-23 17:12:00
2.50.131.186 attackspambots
Invalid user ubnt from 2.50.131.186 port 62036
2020-05-23 17:21:46
93.86.30.125 attackbotsspam
Invalid user r00t from 93.86.30.125 port 63642
2020-05-23 17:07:07
180.76.232.80 attackbots
Invalid user ovx from 180.76.232.80 port 42322
2020-05-23 17:35:41
213.166.150.98 attackspam
Invalid user admin from 213.166.150.98 port 59015
2020-05-23 17:23:48
183.195.121.197 attackbotsspam
Invalid user yhk from 183.195.121.197 port 40216
2020-05-23 17:34:16
81.182.249.106 attackspam
May 23 09:27:10 xeon sshd[950]: Failed password for invalid user buy from 81.182.249.106 port 38848 ssh2
2020-05-23 17:08:06

Recently Reported IPs

239.166.2.104 74.91.23.74 56.175.168.182 215.10.190.5
68.226.123.49 159.83.178.216 141.214.202.160 29.124.246.171
93.145.147.76 255.33.50.127 154.122.83.112 25.183.145.70
186.207.111.80 32.100.80.57 71.60.177.40 41.30.145.213
125.225.129.126 168.218.20.220 45.64.216.171 97.151.155.22