Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.242.34.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.242.34.26.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121601 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 11:13:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 26.34.242.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.34.242.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.106.4.135 attackspam
Bad bot/spoofed identity
2019-09-10 01:59:31
89.223.27.66 attackbots
ssh failed login
2019-09-10 01:45:57
103.36.84.180 attackbotsspam
Sep  9 19:08:52 h2177944 sshd\[28106\]: Invalid user deploy from 103.36.84.180 port 38704
Sep  9 19:08:52 h2177944 sshd\[28106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.180
Sep  9 19:08:54 h2177944 sshd\[28106\]: Failed password for invalid user deploy from 103.36.84.180 port 38704 ssh2
Sep  9 19:15:41 h2177944 sshd\[28342\]: Invalid user git from 103.36.84.180 port 43694
...
2019-09-10 01:38:50
157.230.163.6 attackspam
Sep  9 13:39:25 ny01 sshd[19938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6
Sep  9 13:39:27 ny01 sshd[19938]: Failed password for invalid user testing from 157.230.163.6 port 37092 ssh2
Sep  9 13:45:47 ny01 sshd[21215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6
2019-09-10 01:49:04
60.190.143.82 attackspam
SMB Server BruteForce Attack
2019-09-10 02:21:09
62.234.133.230 attackbotsspam
Sep  9 20:07:26 vps01 sshd[13648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.133.230
Sep  9 20:07:28 vps01 sshd[13648]: Failed password for invalid user test from 62.234.133.230 port 51122 ssh2
2019-09-10 02:20:52
192.227.252.25 attackbotsspam
Sep  9 07:55:34 eddieflores sshd\[7482\]: Invalid user minecraft from 192.227.252.25
Sep  9 07:55:34 eddieflores sshd\[7482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.25
Sep  9 07:55:36 eddieflores sshd\[7482\]: Failed password for invalid user minecraft from 192.227.252.25 port 44616 ssh2
Sep  9 08:04:08 eddieflores sshd\[8270\]: Invalid user testuser from 192.227.252.25
Sep  9 08:04:08 eddieflores sshd\[8270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.25
2019-09-10 02:13:43
83.48.101.184 attack
Sep  9 07:40:39 tdfoods sshd\[8058\]: Invalid user 136 from 83.48.101.184
Sep  9 07:40:39 tdfoods sshd\[8058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.red-83-48-101.staticip.rima-tde.net
Sep  9 07:40:41 tdfoods sshd\[8058\]: Failed password for invalid user 136 from 83.48.101.184 port 19016 ssh2
Sep  9 07:47:22 tdfoods sshd\[8737\]: Invalid user updater123456 from 83.48.101.184
Sep  9 07:47:22 tdfoods sshd\[8737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.red-83-48-101.staticip.rima-tde.net
2019-09-10 02:04:42
112.112.102.79 attackbotsspam
Sep  9 11:03:30 aat-srv002 sshd[17146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.112.102.79
Sep  9 11:03:32 aat-srv002 sshd[17146]: Failed password for invalid user test from 112.112.102.79 port 52827 ssh2
Sep  9 11:08:28 aat-srv002 sshd[17258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.112.102.79
Sep  9 11:08:30 aat-srv002 sshd[17258]: Failed password for invalid user teamspeak3 from 112.112.102.79 port 52828 ssh2
...
2019-09-10 01:26:54
183.111.120.166 attack
Sep  9 19:35:50 rpi sshd[12354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.120.166 
Sep  9 19:35:53 rpi sshd[12354]: Failed password for invalid user mcserver from 183.111.120.166 port 48508 ssh2
2019-09-10 01:55:53
47.89.247.10 attackspam
WordPress wp-login brute force :: 47.89.247.10 0.204 BYPASS [10/Sep/2019:01:03:26  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-10 02:02:38
92.118.38.36 attackspam
Sep  9 19:49:41 webserver postfix/smtpd\[31928\]: warning: unknown\[92.118.38.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 19:50:20 webserver postfix/smtpd\[31928\]: warning: unknown\[92.118.38.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 19:51:00 webserver postfix/smtpd\[1351\]: warning: unknown\[92.118.38.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 19:51:40 webserver postfix/smtpd\[31928\]: warning: unknown\[92.118.38.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 19:52:14 webserver postfix/smtpd\[31928\]: warning: unknown\[92.118.38.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-10 01:55:22
139.198.191.217 attackspam
Sep  9 17:51:55 legacy sshd[18523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
Sep  9 17:51:57 legacy sshd[18523]: Failed password for invalid user servers123 from 139.198.191.217 port 57380 ssh2
Sep  9 17:58:07 legacy sshd[18748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
...
2019-09-10 02:03:47
138.197.2.218 attackbots
fail2ban honeypot
2019-09-10 02:07:47
14.227.40.96 attack
Unauthorized connection attempt from IP address 14.227.40.96 on Port 445(SMB)
2019-09-10 01:28:07

Recently Reported IPs

24.74.67.37 122.39.251.193 50.151.169.161 218.147.29.37
2.172.36.51 49.199.165.38 27.135.68.7 186.32.26.3
221.183.253.211 245.52.201.167 143.236.165.95 27.208.146.209
7.135.220.40 251.247.98.151 135.30.113.170 111.100.199.79
200.120.35.161 253.228.20.100 54.12.136.196 163.180.33.74