Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.134.112.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.134.112.26.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 02:23:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
26.112.134.82.in-addr.arpa domain name pointer 26.82-134-112.bkkb.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
26.112.134.82.in-addr.arpa	name = 26.82-134-112.bkkb.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.49.226.104 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 22:26:18
68.183.169.251 attackspam
Automatic report - SSH Brute-Force Attack
2020-04-17 22:46:06
116.110.66.175 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 22:41:32
60.213.15.150 attack
Apr 17 11:47:04 localhost sshd\[21133\]: Invalid user gpadmin from 60.213.15.150 port 54616
Apr 17 11:47:04 localhost sshd\[21133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.213.15.150
Apr 17 11:47:06 localhost sshd\[21133\]: Failed password for invalid user gpadmin from 60.213.15.150 port 54616 ssh2
...
2020-04-17 22:09:58
37.49.226.132 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-17 22:07:08
180.183.123.195 attack
Bruteforce detected by fail2ban
2020-04-17 22:04:51
2.57.207.110 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-17 22:12:49
157.230.163.6 attackspam
prod3
...
2020-04-17 22:43:59
101.198.180.207 attack
Apr  5 08:53:17 r.ca sshd[30916]: Failed password for root from 101.198.180.207 port 46868 ssh2
2020-04-17 22:34:46
141.98.81.99 attackspambots
Apr 17 14:41:53 work-partkepr sshd\[13753\]: Invalid user Administrator from 141.98.81.99 port 39575
Apr 17 14:41:53 work-partkepr sshd\[13753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.99
...
2020-04-17 22:43:00
37.49.226.13 attack
Invalid user fake from 37.49.226.13 port 46354
2020-04-17 22:10:48
106.38.203.230 attack
Apr 17 06:37:13 mockhub sshd[32506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.203.230
Apr 17 06:37:15 mockhub sshd[32506]: Failed password for invalid user qe from 106.38.203.230 port 16794 ssh2
...
2020-04-17 22:06:33
185.202.2.149 attack
Unauthorized connection attempt detected from IP address 185.202.2.149 to port 10000 [T]
2020-04-17 22:14:16
186.147.129.110 attackbotsspam
Apr 17 14:52:38 xeon sshd[63776]: Failed password for invalid user bo from 186.147.129.110 port 54730 ssh2
2020-04-17 22:03:56
141.98.81.81 attackspambots
$f2bV_matches
2020-04-17 22:26:37

Recently Reported IPs

188.50.100.151 39.189.44.103 116.212.161.253 123.159.38.227
51.229.255.56 193.193.79.23 171.92.245.3 197.143.68.112
204.34.87.72 176.69.253.39 255.190.194.62 12.117.99.103
193.193.79.202 136.223.30.95 198.182.56.38 242.185.134.142
31.117.121.214 198.20.204.125 132.216.153.83 224.20.11.188