Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Slemmestad

Region: Viken

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.66.26.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;46.66.26.44.			IN	A

;; AUTHORITY SECTION:
.			309	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060302 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 04 07:23:59 CST 2020
;; MSG SIZE  rcvd: 115
Host info
44.26.66.46.in-addr.arpa domain name pointer 46.66.26.44.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
44.26.66.46.in-addr.arpa	name = 46.66.26.44.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.83.37 attack
2019-12-10T18:51:11.188833shield sshd\[2766\]: Invalid user apc from 122.51.83.37 port 35118
2019-12-10T18:51:11.193494shield sshd\[2766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.37
2019-12-10T18:51:13.275568shield sshd\[2766\]: Failed password for invalid user apc from 122.51.83.37 port 35118 ssh2
2019-12-10T19:01:03.918358shield sshd\[5712\]: Invalid user derluen from 122.51.83.37 port 54962
2019-12-10T19:01:03.922843shield sshd\[5712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.37
2019-12-11 03:04:02
176.31.122.7 attackbots
Dec 10 14:02:37 plusreed sshd[17172]: Invalid user test from 176.31.122.7
...
2019-12-11 03:02:54
45.55.233.213 attackspam
Dec 10 21:11:23 server sshd\[7810\]: Invalid user mutimer from 45.55.233.213
Dec 10 21:11:23 server sshd\[7810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213 
Dec 10 21:11:24 server sshd\[7810\]: Failed password for invalid user mutimer from 45.55.233.213 port 57948 ssh2
Dec 10 21:17:04 server sshd\[9217\]: Invalid user test from 45.55.233.213
Dec 10 21:17:04 server sshd\[9217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.233.213 
...
2019-12-11 02:52:45
89.97.0.61 attack
Automatic report - Port Scan Attack
2019-12-11 02:35:19
132.248.192.9 attackspam
Dec 10 19:11:30 MK-Soft-VM3 sshd[15295]: Failed password for root from 132.248.192.9 port 56746 ssh2
...
2019-12-11 02:40:36
185.36.81.23 attackspam
Rude login attack (19 tries in 1d)
2019-12-11 02:56:08
103.74.121.142 attackbots
Request to REST API ///wp-json/wp/v2/users/
2019-12-11 02:58:01
158.69.22.218 attackspam
Dec 10 08:41:39 php1 sshd\[16798\]: Invalid user gp from 158.69.22.218
Dec 10 08:41:39 php1 sshd\[16798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns519074.ip-158-69-22.net
Dec 10 08:41:40 php1 sshd\[16798\]: Failed password for invalid user gp from 158.69.22.218 port 47750 ssh2
Dec 10 08:47:20 php1 sshd\[17545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns519074.ip-158-69-22.net  user=root
Dec 10 08:47:22 php1 sshd\[17545\]: Failed password for root from 158.69.22.218 port 56194 ssh2
2019-12-11 03:05:38
222.186.42.4 attack
Dec 11 00:05:55 gw1 sshd[28562]: Failed password for root from 222.186.42.4 port 38228 ssh2
Dec 11 00:06:09 gw1 sshd[28562]: Failed password for root from 222.186.42.4 port 38228 ssh2
Dec 11 00:06:09 gw1 sshd[28562]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 38228 ssh2 [preauth]
...
2019-12-11 03:09:42
170.80.60.2 attack
Automatic report - Port Scan Attack
2019-12-11 03:11:37
185.36.81.78 attackspambots
Rude login attack (20 tries in 1d)
2019-12-11 02:59:02
159.65.26.61 attack
Dec 10 19:38:50 MK-Soft-VM6 sshd[20228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.26.61 
Dec 10 19:38:52 MK-Soft-VM6 sshd[20228]: Failed password for invalid user anchia from 159.65.26.61 port 37242 ssh2
...
2019-12-11 02:44:11
112.85.42.175 attackbotsspam
F2B jail: sshd. Time: 2019-12-10 19:42:46, Reported by: VKReport
2019-12-11 02:45:57
106.12.241.109 attackspam
Dec 10 08:32:10 sachi sshd\[7636\]: Invalid user chinami from 106.12.241.109
Dec 10 08:32:10 sachi sshd\[7636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109
Dec 10 08:32:12 sachi sshd\[7636\]: Failed password for invalid user chinami from 106.12.241.109 port 50360 ssh2
Dec 10 08:38:49 sachi sshd\[8283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109  user=root
Dec 10 08:38:51 sachi sshd\[8283\]: Failed password for root from 106.12.241.109 port 57746 ssh2
2019-12-11 02:41:40
103.101.52.48 attackspambots
$f2bV_matches
2019-12-11 02:39:38

Recently Reported IPs

45.233.147.145 77.98.101.166 1.170.160.182 12.114.100.63
90.172.90.73 183.226.206.159 100.156.201.118 103.25.134.251
78.244.117.207 50.97.249.209 182.78.145.204 203.143.64.138
71.206.83.236 45.78.187.67 182.47.187.115 71.17.10.8
186.124.55.20 175.33.97.42 82.21.12.188 175.18.5.71