Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.134.26.49 attack
port scan
2021-07-28 06:50:03
45.134.26.227 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 44269 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 21:00:22
45.134.26.222 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 44510 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 20:43:41
45.134.26.227 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 44269 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:28:33
45.134.26.222 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 44510 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 12:15:03
45.134.26.227 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 44269 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 05:18:17
45.134.26.222 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 44510 proto: tcp cat: Misc Attackbytes: 60
2020-10-13 05:05:10
45.134.26.250 attack
Repeated RDP login failures. Last user: scanner
2020-10-05 04:02:49
45.134.26.250 attackspambots
Repeated RDP login failures. Last user: sqlservice
2020-10-04 19:53:38
45.134.26.250 attackbotsspam
Repeated RDP login failures. Last user: remote
2020-10-03 05:38:35
45.134.26.250 attackspam
Repeated RDP login failures. Last user: scanner
2020-10-03 01:03:01
45.134.26.250 attack
Repeated RDP login failures. Last user: scanner
2020-10-02 21:32:37
45.134.26.250 attackbotsspam
Repeated RDP login failures. Last user: front2
2020-10-02 18:05:20
45.134.26.250 attackbotsspam
Repeated RDP login failures. Last user: front2
2020-10-02 14:34:11
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.134.26.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.134.26.20.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:45:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 20.26.134.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.26.134.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.161.177.95 attackspambots
5555/tcp
[2020-01-31]1pkt
2020-02-01 07:42:24
117.73.2.103 attack
Invalid user kundir from 117.73.2.103 port 57406
2020-02-01 07:28:19
52.65.180.169 attack
Malicious brute force vulnerability hacking attacks
2020-02-01 07:35:08
171.247.140.22 attackspambots
445/tcp
[2020-01-31]1pkt
2020-02-01 07:31:16
185.176.27.34 attackspambots
01/31/2020-22:33:46.579878 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-01 07:34:27
192.241.227.87 attackspam
512/tcp
[2020-01-31]1pkt
2020-02-01 07:26:32
121.130.237.83 attackbotsspam
81/tcp
[2020-01-31]1pkt
2020-02-01 07:13:07
37.179.146.86 attack
Automatic report - Port Scan Attack
2020-02-01 07:15:24
64.190.205.74 attackbots
Invalid user jaina from 64.190.205.74 port 37614
2020-02-01 07:13:33
182.61.176.105 attack
frenzy
2020-02-01 07:21:38
175.168.11.144 attack
23/tcp
[2020-01-31]1pkt
2020-02-01 07:22:57
190.55.63.8 attack
445/tcp 445/tcp
[2020-01-31]2pkt
2020-02-01 07:14:19
172.247.123.70 attackbots
Invalid user navneeta from 172.247.123.70 port 43632
2020-02-01 07:32:10
195.9.20.102 attackbots
Unauthorised access (Jan 31) SRC=195.9.20.102 LEN=52 TTL=113 ID=6626 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-01 07:30:59
162.243.129.111 attack
Fail2Ban Ban Triggered
2020-02-01 07:19:19

Recently Reported IPs

45.134.26.27 45.134.26.28 45.134.26.29 45.136.161.2
45.136.14.134 45.136.162.2 45.136.160.2 45.136.31.61
45.136.52.5 45.137.22.106 45.137.13.106 45.137.13.2
45.137.22.184 45.137.22.92 45.137.22.146 45.138.100.171
45.138.102.115 45.138.101.80 45.138.102.100 45.138.102.112