Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.26.134.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.26.134.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 12:27:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
248.134.26.45.in-addr.arpa domain name pointer 45-26-134-248.lightspeed.gdrpmi.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
248.134.26.45.in-addr.arpa	name = 45-26-134-248.lightspeed.gdrpmi.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.33.12.237 attack
$f2bV_matches
2020-04-21 18:26:17
111.167.187.70 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-21 18:59:12
195.154.42.43 attack
Invalid user firefart from 195.154.42.43 port 45772
2020-04-21 18:42:26
119.93.116.186 attackspambots
(sshd) Failed SSH login from 119.93.116.186 (PH/Philippines/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 03:48:45 andromeda sshd[21951]: Did not receive identification string from 119.93.116.186 port 56927
Apr 21 03:49:29 andromeda sshd[21962]: Invalid user admin2 from 119.93.116.186 port 59241
Apr 21 03:49:31 andromeda sshd[21962]: Failed password for invalid user admin2 from 119.93.116.186 port 59241 ssh2
2020-04-21 18:45:49
106.13.29.29 attackbotsspam
Apr 21 08:06:46 124388 sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29
Apr 21 08:06:46 124388 sshd[24209]: Invalid user zs from 106.13.29.29 port 53926
Apr 21 08:06:48 124388 sshd[24209]: Failed password for invalid user zs from 106.13.29.29 port 53926 ssh2
Apr 21 08:09:37 124388 sshd[24410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29  user=root
Apr 21 08:09:38 124388 sshd[24410]: Failed password for root from 106.13.29.29 port 58352 ssh2
2020-04-21 18:37:33
111.229.128.9 attackbotsspam
2020-04-20 UTC: (10x) - guoq,lx,root(5x),test,tg,vnc
2020-04-21 18:37:14
128.199.103.239 attackbots
Apr 21 09:39:07 l03 sshd[2001]: Invalid user y from 128.199.103.239 port 41614
...
2020-04-21 19:04:46
218.92.0.192 attack
Apr 21 06:12:26 legacy sshd[5819]: Failed password for root from 218.92.0.192 port 59965 ssh2
Apr 21 06:13:25 legacy sshd[5829]: Failed password for root from 218.92.0.192 port 39918 ssh2
...
2020-04-21 18:50:03
195.29.105.125 attackspambots
(sshd) Failed SSH login from 195.29.105.125 (HR/Croatia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 10:17:26 s1 sshd[27283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125  user=root
Apr 21 10:17:29 s1 sshd[27283]: Failed password for root from 195.29.105.125 port 42560 ssh2
Apr 21 10:22:45 s1 sshd[27490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125  user=root
Apr 21 10:22:47 s1 sshd[27490]: Failed password for root from 195.29.105.125 port 36018 ssh2
Apr 21 10:24:46 s1 sshd[27577]: Invalid user bq from 195.29.105.125 port 42762
2020-04-21 18:50:56
180.190.34.56 attackspambots
Unauthorized connection attempt detected from IP address 180.190.34.56 to port 445
2020-04-21 18:51:20
104.155.148.64 attackbotsspam
PHI,DEF GET /phpMyAdmin/scripts/setup.php
2020-04-21 18:57:08
106.13.189.158 attack
SSH Brute-Force. Ports scanning.
2020-04-21 18:56:49
122.55.51.146 attackbotsspam
Port probing on unauthorized port 445
2020-04-21 19:08:20
124.156.121.233 attackbotsspam
2020-04-21T09:27:51.169074vps773228.ovh.net sshd[15124]: Invalid user docker from 124.156.121.233 port 51154
2020-04-21T09:27:51.181485vps773228.ovh.net sshd[15124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233
2020-04-21T09:27:51.169074vps773228.ovh.net sshd[15124]: Invalid user docker from 124.156.121.233 port 51154
2020-04-21T09:27:53.631943vps773228.ovh.net sshd[15124]: Failed password for invalid user docker from 124.156.121.233 port 51154 ssh2
2020-04-21T09:34:48.144918vps773228.ovh.net sshd[15240]: Invalid user ubuntu from 124.156.121.233 port 42682
...
2020-04-21 18:44:29
49.233.70.35 attackbots
04/20/2020-23:49:19.223468 49.233.70.35 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-21 19:01:14

Recently Reported IPs

175.158.250.122 126.21.74.53 18.251.17.154 255.179.19.13
213.137.229.222 165.247.231.241 136.163.249.184 119.169.232.46
146.224.17.55 199.52.144.249 135.244.169.144 213.173.34.100
192.101.3.215 200.34.1.83 37.29.106.25 178.217.47.68
221.182.230.134 136.116.86.176 207.229.80.39 112.92.222.176