Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.64.136.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5233
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.64.136.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:44:02 CST 2025
;; MSG SIZE  rcvd: 106
Host info
126.136.64.91.in-addr.arpa domain name pointer ip5b40887e.dynamic.kabel-deutschland.de.
Nslookup info:
b'126.136.64.91.in-addr.arpa	name = ip5b40887e.dynamic.kabel-deutschland.de.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
212.156.245.134 attack
Unauthorized connection attempt from IP address 212.156.245.134 on Port 445(SMB)
2019-10-03 03:13:08
222.186.31.145 attackspam
2019-10-02T19:17:27.425508abusebot-7.cloudsearch.cf sshd\[7313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.145  user=root
2019-10-03 03:19:08
196.189.89.105 attackbotsspam
SpamReport
2019-10-03 03:06:02
51.83.32.232 attack
Oct  2 20:44:37 mail sshd[10907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.32.232
Oct  2 20:44:40 mail sshd[10907]: Failed password for invalid user tccuser from 51.83.32.232 port 58486 ssh2
...
2019-10-03 03:05:41
92.119.160.80 attackspam
10/02/2019-14:47:11.548326 92.119.160.80 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-03 02:59:53
118.163.193.82 attackbots
Oct  2 17:23:13 anodpoucpklekan sshd[68170]: Invalid user ubuntu from 118.163.193.82 port 41406
Oct  2 17:23:15 anodpoucpklekan sshd[68170]: Failed password for invalid user ubuntu from 118.163.193.82 port 41406 ssh2
...
2019-10-03 03:23:39
109.252.29.177 attackbotsspam
SpamReport
2019-10-03 03:39:16
175.6.70.161 attack
2019-10-02 14:34:30 dovecot_login authenticator failed for (lerctr.org) [175.6.70.161]:40051 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=nologin@lerctr.org)
2019-10-02 14:34:48 dovecot_login authenticator failed for (lerctr.org) [175.6.70.161]:41020 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=admin@lerctr.org)
2019-10-02 14:35:05 dovecot_login authenticator failed for (lerctr.org) [175.6.70.161]:42082 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=abuse@lerctr.org)
...
2019-10-03 03:37:06
125.212.201.7 attackbots
Oct  2 09:16:25 sachi sshd\[30062\]: Invalid user jdk1.8.0_45 from 125.212.201.7
Oct  2 09:16:25 sachi sshd\[30062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.201.7
Oct  2 09:16:26 sachi sshd\[30062\]: Failed password for invalid user jdk1.8.0_45 from 125.212.201.7 port 60253 ssh2
Oct  2 09:21:29 sachi sshd\[30493\]: Invalid user 8 from 125.212.201.7
Oct  2 09:21:29 sachi sshd\[30493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.201.7
2019-10-03 03:27:47
102.68.77.74 attackbots
SpamReport
2019-10-03 03:43:09
220.135.132.143 attack
Oct  2 14:30:03 mc1 kernel: \[1305821.490016\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=220.135.132.143 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=3904 PROTO=TCP SPT=37113 DPT=23 WINDOW=30115 RES=0x00 SYN URGP=0 
Oct  2 14:30:28 mc1 kernel: \[1305846.755888\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=220.135.132.143 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=3904 PROTO=TCP SPT=37113 DPT=23 WINDOW=30115 RES=0x00 SYN URGP=0 
Oct  2 14:30:32 mc1 kernel: \[1305850.348314\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=220.135.132.143 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=3904 PROTO=TCP SPT=37113 DPT=23 WINDOW=30115 RES=0x00 SYN URGP=0 
...
2019-10-03 02:58:58
121.153.109.75 attackbots
SpamReport
2019-10-03 03:35:12
185.175.32.163 attack
SpamReport
2019-10-03 03:40:03
181.49.84.55 attackspambots
SpamReport
2019-10-03 03:22:35
191.114.20.205 attackspam
SpamReport
2019-10-03 03:11:53

Recently Reported IPs

103.22.196.199 23.63.117.216 149.167.118.171 160.53.251.206
36.59.32.82 56.77.157.27 232.243.91.237 215.103.238.63
242.173.64.14 66.217.90.70 79.107.109.197 169.79.205.99
44.10.21.208 106.38.11.140 104.136.167.189 226.78.173.243
146.25.122.139 245.124.227.135 90.122.176.192 170.186.110.226