Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
137.226.113.10 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-12 01:59:28
137.226.113.10 attackbots
Port scan denied
2020-09-11 17:50:45
137.226.113.56 attackbotsspam
4843/tcp 1883/tcp 8883/tcp...
[2020-06-14/08-11]44pkt,5pt.(tcp)
2020-08-12 07:49:20
137.226.113.56 attackspam
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [T]
2020-07-20 06:50:01
137.226.113.56 attackbots
Port Scan
...
2020-07-14 02:14:02
137.226.113.9 attackspambots
port scan and connect, tcp 443 (https)
2020-06-06 21:06:05
137.226.113.56 attackbots
srv02 Mass scanning activity detected Target: 102(iso-tsap) ..
2020-06-01 20:17:23
137.226.113.27 attackbots
mozilla/5.0+zgrab/0.x+(compatible;+researchscan/t12sns;++http://researchscan.comsys.rwth-aachen.de)
2020-05-31 07:27:51
137.226.113.31 attackspambots
*Port Scan* detected from 137.226.113.31 (DE/Germany/researchscan23.comsys.rwth-aachen.de). 5 hits in the last 35 seconds
2020-05-25 17:19:31
137.226.113.10 attack
137.226.113.10
2020-04-14 12:57:11
137.226.113.56 attack
Apr 13 15:48:24 debian-2gb-nbg1-2 kernel: \[9044698.686856\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.56 DST=195.201.40.59 LEN=64 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=TCP SPT=47703 DPT=102 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-14 01:14:48
137.226.113.56 attackbots
" "
2020-04-06 00:29:43
137.226.113.10 attack
Mar  5 21:51:17 debian-2gb-nbg1-2 kernel: \[5700646.129243\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.10 DST=195.201.40.59 LEN=1228 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=50832 DPT=443 LEN=1208
2020-03-06 05:32:53
137.226.113.56 attack
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 102 [J]
2020-03-03 00:36:56
137.226.113.56 attackbots
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [J]
2020-03-02 02:31:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.1.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.1.164.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 07:01:33 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 164.1.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.1.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.72.194.156 attackbots
Aug  8 17:42:12 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 17:45:41 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 17:45:52 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 17:46:08 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 17:46:28 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.156\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-09 00:45:22
216.104.200.2 attack
Aug  8 16:43:02 cosmoit sshd[30101]: Failed password for root from 216.104.200.2 port 35298 ssh2
2020-08-09 01:13:36
213.149.103.132 attack
213.149.103.132 - - [08/Aug/2020:18:12:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.149.103.132 - - [08/Aug/2020:18:12:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
213.149.103.132 - - [08/Aug/2020:18:12:12 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 01:17:12
111.72.194.154 attackspambots
Aug  8 17:38:44 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.154\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Aug  8 17:39:11 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.154\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Aug  8 17:41:56 srv01 postfix/smtpd\[12048\]: warning: unknown\[111.72.194.154\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 17:49:08 srv01 postfix/smtpd\[17918\]: warning: unknown\[111.72.194.154\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Aug  8 17:52:30 srv01 postfix/smtpd\[17917\]: warning: unknown\[111.72.194.154\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-09 01:09:35
170.233.30.33 attackspam
Aug  8 16:03:54 icinga sshd[54465]: Failed password for root from 170.233.30.33 port 51272 ssh2
Aug  8 16:11:49 icinga sshd[2198]: Failed password for root from 170.233.30.33 port 53478 ssh2
...
2020-08-09 00:37:50
106.12.77.32 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-09 01:07:53
106.12.146.9 attackspam
Aug  8 17:58:48 prod4 sshd\[4362\]: Invalid user WinDdos\* from 106.12.146.9
Aug  8 17:58:50 prod4 sshd\[4362\]: Failed password for invalid user WinDdos\* from 106.12.146.9 port 58264 ssh2
Aug  8 18:04:10 prod4 sshd\[7084\]: Invalid user 123qwertyu from 106.12.146.9
...
2020-08-09 00:36:15
52.142.146.243 attackspam
natural.cannabis.gummies@textualselection.com, edf40220.ukwest.cloudapp.azure.com, arthurcdumas010+58zer4gq@gmail.com, support@podio.com,
2020-08-09 01:11:24
23.98.150.205 attackbotsspam
Aug  8 18:35:35 vpn01 sshd[874]: Failed password for root from 23.98.150.205 port 10953 ssh2
...
2020-08-09 00:48:54
13.94.98.221 attackbotsspam
Aug  8 16:06:03 vpn01 sshd[28258]: Failed password for root from 13.94.98.221 port 43003 ssh2
...
2020-08-09 00:54:59
40.117.102.188 attack
40.117.102.188 - - [08/Aug/2020:17:26:59 +0100] "POST //wp-login.php HTTP/1.1" 200 5870 "https://iwantzone.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [08/Aug/2020:17:26:59 +0100] "POST //wp-login.php HTTP/1.1" 200 5863 "https://iwantzone.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
40.117.102.188 - - [08/Aug/2020:17:37:08 +0100] "POST //wp-login.php HTTP/1.1" 200 5863 "https://iwantzone.com//wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
...
2020-08-09 00:48:36
112.85.42.181 attackspambots
2020-08-08T16:35:29.376173shield sshd\[13871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
2020-08-08T16:35:31.446540shield sshd\[13871\]: Failed password for root from 112.85.42.181 port 5091 ssh2
2020-08-08T16:35:34.266562shield sshd\[13871\]: Failed password for root from 112.85.42.181 port 5091 ssh2
2020-08-08T16:35:37.841489shield sshd\[13871\]: Failed password for root from 112.85.42.181 port 5091 ssh2
2020-08-08T16:35:41.307941shield sshd\[13871\]: Failed password for root from 112.85.42.181 port 5091 ssh2
2020-08-09 00:54:31
1.9.128.17 attackbotsspam
Aug  8 18:41:58 Ubuntu-1404-trusty-64-minimal sshd\[24303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
Aug  8 18:42:00 Ubuntu-1404-trusty-64-minimal sshd\[24303\]: Failed password for root from 1.9.128.17 port 21249 ssh2
Aug  8 18:50:29 Ubuntu-1404-trusty-64-minimal sshd\[28543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
Aug  8 18:50:31 Ubuntu-1404-trusty-64-minimal sshd\[28543\]: Failed password for root from 1.9.128.17 port 2199 ssh2
Aug  8 18:55:04 Ubuntu-1404-trusty-64-minimal sshd\[30075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
2020-08-09 01:12:44
203.6.149.195 attackbots
Aug  8 02:06:36 php1 sshd\[4145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.6.149.195  user=root
Aug  8 02:06:38 php1 sshd\[4145\]: Failed password for root from 203.6.149.195 port 58908 ssh2
Aug  8 02:10:14 php1 sshd\[4612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.6.149.195  user=root
Aug  8 02:10:16 php1 sshd\[4612\]: Failed password for root from 203.6.149.195 port 47680 ssh2
Aug  8 02:13:27 php1 sshd\[4873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.6.149.195  user=root
2020-08-09 00:40:22
14.192.248.5 attackbotsspam
(imapd) Failed IMAP login from 14.192.248.5 (MY/Malaysia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug  8 16:43:16 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=14.192.248.5, lip=5.63.12.44, session=
2020-08-09 00:41:07

Recently Reported IPs

137.226.0.55 49.0.129.3 137.226.0.101 137.226.1.99
43.154.190.78 34.70.148.223 190.217.101.79 188.192.199.42
166.70.37.59 210.65.144.17 138.68.151.48 5.167.65.103
106.14.56.187 5.167.64.125 20.125.121.207 5.167.65.165
23.128.248.49 5.167.65.110 5.167.64.173 137.226.1.101