Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.226.45.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.226.45.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 03:43:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
134.45.226.81.in-addr.arpa domain name pointer 81-226-45-134-no266.tbcn.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.45.226.81.in-addr.arpa	name = 81-226-45-134-no266.tbcn.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.61.5.122 attackbots
Nov  9 14:54:45 vps691689 sshd[2509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.5.122
Nov  9 14:54:47 vps691689 sshd[2509]: Failed password for invalid user donald from 217.61.5.122 port 48030 ssh2
Nov  9 14:58:47 vps691689 sshd[2575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.5.122
...
2019-11-09 22:05:35
45.136.108.68 attack
Connection by 45.136.108.68 on port: 3872 got caught by honeypot at 11/9/2019 10:07:39 AM
2019-11-09 21:56:58
69.94.157.82 attack
Nov  9 07:18:31  exim[24176]: 2019-11-09 07:18:31 1iTK4s-0006Hw-KO H=mint.culturemaroc.com (mint.andrefcarvalho.com) [69.94.157.82] F= rejected after DATA: This message scored 103.5 spam points.
2019-11-09 21:48:52
110.49.70.241 attack
Automatic report - Banned IP Access
2019-11-09 22:16:53
183.111.227.5 attackbots
detected by Fail2Ban
2019-11-09 21:54:02
180.76.176.174 attackspam
Nov  9 14:08:05 tux-35-217 sshd\[20591\]: Invalid user solrs from 180.76.176.174 port 35528
Nov  9 14:08:05 tux-35-217 sshd\[20591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.174
Nov  9 14:08:08 tux-35-217 sshd\[20591\]: Failed password for invalid user solrs from 180.76.176.174 port 35528 ssh2
Nov  9 14:13:23 tux-35-217 sshd\[20619\]: Invalid user mysql from 180.76.176.174 port 40758
Nov  9 14:13:23 tux-35-217 sshd\[20619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.174
...
2019-11-09 21:42:12
222.186.175.167 attackbots
Nov  9 14:02:58 mqcr-prodweb2 sshd\[15909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Nov  9 14:02:59 mqcr-prodweb2 sshd\[15909\]: Failed password for root from 222.186.175.167 port 37276 ssh2
Nov  9 14:03:04 mqcr-prodweb2 sshd\[15909\]: Failed password for root from 222.186.175.167 port 37276 ssh2
Nov  9 14:03:09 mqcr-prodweb2 sshd\[15909\]: Failed password for root from 222.186.175.167 port 37276 ssh2
Nov  9 14:03:13 mqcr-prodweb2 sshd\[15909\]: Failed password for root from 222.186.175.167 port 37276 ssh2
...
2019-11-09 22:07:21
150.95.186.200 attackbots
Nov  9 11:28:35 XXX sshd[21600]: Invalid user deploy from 150.95.186.200 port 37738
2019-11-09 21:54:50
139.59.169.84 attackbots
Automatic report - XMLRPC Attack
2019-11-09 21:41:23
45.136.108.67 attack
Connection by 45.136.108.67 on port: 5909 got caught by honeypot at 11/9/2019 8:49:15 AM
2019-11-09 22:00:28
23.238.16.91 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 21:35:17
82.200.163.214 attack
Unauthorised access (Nov  9) SRC=82.200.163.214 LEN=52 TTL=112 ID=22205 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-09 21:51:17
14.63.169.33 attackspam
2019-11-09T13:16:06.402266  sshd[12080]: Invalid user win from 14.63.169.33 port 34244
2019-11-09T13:16:06.415011  sshd[12080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33
2019-11-09T13:16:06.402266  sshd[12080]: Invalid user win from 14.63.169.33 port 34244
2019-11-09T13:16:08.542597  sshd[12080]: Failed password for invalid user win from 14.63.169.33 port 34244 ssh2
2019-11-09T13:20:35.327513  sshd[12116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33  user=root
2019-11-09T13:20:37.384713  sshd[12116]: Failed password for root from 14.63.169.33 port 53028 ssh2
...
2019-11-09 21:35:54
81.183.253.86 attackbots
Nov  9 08:31:15 meumeu sshd[32331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 
Nov  9 08:31:17 meumeu sshd[32331]: Failed password for invalid user fUWUqI@ from 81.183.253.86 port 53924 ssh2
Nov  9 08:36:05 meumeu sshd[416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 
...
2019-11-09 22:01:06
45.136.110.40 attackbotsspam
Nov  9 13:47:05 h2177944 kernel: \[6179212.628904\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=2398 PROTO=TCP SPT=48096 DPT=3900 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 13:47:15 h2177944 kernel: \[6179222.418701\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39562 PROTO=TCP SPT=48096 DPT=7391 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 13:57:42 h2177944 kernel: \[6179849.370567\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=17421 PROTO=TCP SPT=48096 DPT=5553 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 14:06:07 h2177944 kernel: \[6180354.254241\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.40 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=22109 PROTO=TCP SPT=48096 DPT=40300 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  9 14:35:44 h2177944 kernel: \[6182130.690960\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.40 DST=85.214.117.9
2019-11-09 21:52:44

Recently Reported IPs

63.155.177.152 150.248.165.86 220.222.104.114 114.82.14.61
133.141.140.68 26.199.215.154 205.198.129.151 223.89.64.144
241.56.14.213 161.63.102.206 182.150.208.164 35.59.225.146
24.131.89.167 230.125.255.69 54.48.218.28 214.138.245.6
209.87.5.51 209.107.247.27 17.22.171.0 172.217.96.129