Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.134.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.199.134.26.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023091402 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 15 11:39:05 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 26.134.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.134.199.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.173.159.153 attackbots
8080/tcp
[2019-07-30]1pkt
2019-07-30 20:26:21
45.160.148.133 attack
Jul 30 08:48:48 lnxded64 sshd[11052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.148.133
2019-07-30 20:19:40
203.205.51.74 attackspam
445/tcp 445/tcp
[2019-07-13/29]2pkt
2019-07-30 19:52:46
180.252.43.16 attackspam
445/tcp
[2019-07-30]1pkt
2019-07-30 20:28:44
43.226.49.26 attackbotsspam
Brute-Force Port=
2019-07-30 20:05:10
134.175.154.93 attackbots
Jul 30 12:49:35 minden010 sshd[16067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.154.93
Jul 30 12:49:37 minden010 sshd[16067]: Failed password for invalid user jana from 134.175.154.93 port 48764 ssh2
Jul 30 12:55:01 minden010 sshd[17917]: Failed password for root from 134.175.154.93 port 43736 ssh2
...
2019-07-30 19:51:19
62.121.131.62 attackspambots
scan z
2019-07-30 20:24:45
113.110.231.192 attackspambots
445/tcp
[2019-07-30]1pkt
2019-07-30 20:27:47
89.33.25.237 attackbots
Automatic report - Banned IP Access
2019-07-30 20:29:12
106.13.48.201 attackspambots
30.07.2019 03:03:35 SSH access blocked by firewall
2019-07-30 20:24:19
2.139.176.35 attackbotsspam
2019-07-30T05:33:05.720613abusebot-3.cloudsearch.cf sshd\[21962\]: Invalid user rita from 2.139.176.35 port 8910
2019-07-30 20:23:06
107.175.194.181 attack
Jul 30 12:50:41 v22018076622670303 sshd\[9044\]: Invalid user tgallen from 107.175.194.181 port 36968
Jul 30 12:50:41 v22018076622670303 sshd\[9044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.194.181
Jul 30 12:50:42 v22018076622670303 sshd\[9044\]: Failed password for invalid user tgallen from 107.175.194.181 port 36968 ssh2
...
2019-07-30 20:02:42
49.231.148.156 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-31/07-29]8pkt,1pt.(tcp)
2019-07-30 19:55:14
167.86.79.150 attack
Automatic report - Banned IP Access
2019-07-30 20:23:37
115.78.73.185 attackspambots
445/tcp
[2019-07-30]1pkt
2019-07-30 20:27:15

Recently Reported IPs

95.26.200.84 26.197.51.142 94.25.239.222 198.54.135.201
65.49.1.26 239.9.118.152 147.182.247.115 107.190.128.252
156.220.121.143 102.43.177.164 72.118.30.20 103.121.89.51
15.168.13.254 3.227.132.129 173.82.226.159 156.231.10.11
156.231.5.17 115.78.235.94 49.241.45.19 140.39.208.169