Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bergen

Region: Hordaland

Country: Norway

Internet Service Provider: BKK Fiber AS

Hostname: unknown

Organization: BKK Digitek AS

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Mar 16 19:25:03 localhost sshd\[9265\]: Invalid user pi from 82.134.26.50
Mar 16 19:25:03 localhost sshd\[9265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.134.26.50
Mar 16 19:25:05 localhost sshd\[9265\]: Failed password for invalid user pi from 82.134.26.50 port 51392 ssh2
Mar 16 19:31:57 localhost sshd\[9636\]: Invalid user debian from 82.134.26.50
Mar 16 19:31:57 localhost sshd\[9636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.134.26.50
...
2020-03-17 04:38:56
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.134.26.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 632
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.134.26.50.			IN	A

;; AUTHORITY SECTION:
.			1350	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060601 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jun 07 03:32:30 CST 2019
;; MSG SIZE  rcvd: 116

Host info
50.26.134.82.in-addr.arpa domain name pointer 50.82-134-26.bkkb.no.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.26.134.82.in-addr.arpa	name = 50.82-134-26.bkkb.no.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
202.134.0.9 attackbots
 TCP (SYN) 202.134.0.9:47622 -> port 6328, len 44
2020-10-04 06:12:36
178.148.186.248 attackspam
Brute forcing email accounts
2020-10-04 05:57:16
189.240.117.236 attack
Bruteforce detected by fail2ban
2020-10-04 05:58:10
45.90.216.118 attack
SSH Invalid Login
2020-10-04 06:16:32
176.58.105.46 attack
Found on   CINS badguys     / proto=6  .  srcport=55990  .  dstport=7070  .     (1394)
2020-10-04 05:48:03
119.28.227.100 attackbotsspam
Oct  3 23:03:20 sip sshd[15527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.227.100
Oct  3 23:03:23 sip sshd[15527]: Failed password for invalid user pos from 119.28.227.100 port 41954 ssh2
Oct  3 23:18:44 sip sshd[19625]: Failed password for root from 119.28.227.100 port 33206 ssh2
2020-10-04 06:17:23
106.51.80.198 attack
SSH Invalid Login
2020-10-04 06:08:56
134.73.5.5 attackspambots
$f2bV_matches
2020-10-04 06:09:39
45.125.222.120 attack
Oct  3 23:52:28 ns382633 sshd\[15976\]: Invalid user wp-user from 45.125.222.120 port 43078
Oct  3 23:52:28 ns382633 sshd\[15976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
Oct  3 23:52:30 ns382633 sshd\[15976\]: Failed password for invalid user wp-user from 45.125.222.120 port 43078 ssh2
Oct  4 00:03:52 ns382633 sshd\[17282\]: Invalid user deployer from 45.125.222.120 port 60982
Oct  4 00:03:52 ns382633 sshd\[17282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
2020-10-04 06:05:39
106.75.246.176 attack
Invalid user tomcat from 106.75.246.176 port 48334
2020-10-04 06:14:43
64.227.19.127 attackspambots
firewall-block, port(s): 6923/tcp
2020-10-04 06:10:19
121.15.137.137 attackspam
 TCP (SYN) 121.15.137.137:40911 -> port 1433, len 44
2020-10-04 06:01:53
138.99.204.224 attackbots
firewall-block, port(s): 23/tcp
2020-10-04 05:56:22
208.68.39.220 attackspam
Port scan: Attack repeated for 24 hours
2020-10-04 06:18:06
193.202.83.140 attack
(mod_security) mod_security (id:210730) triggered by 193.202.83.140 (RU/Russia/-): 5 in the last 300 secs
2020-10-04 05:53:32

Recently Reported IPs

225.250.195.195 200.56.7.243 180.129.245.154 183.214.164.208
80.75.97.252 190.239.55.183 183.255.252.88 190.14.133.61
194.145.21.139 200.236.216.242 132.104.198.51 152.206.144.111
154.183.33.222 58.48.233.51 131.109.126.208 209.180.12.212
71.9.220.181 195.221.123.196 186.240.235.62 78.57.109.204