Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
137.226.113.10 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-12 01:59:28
137.226.113.10 attackbots
Port scan denied
2020-09-11 17:50:45
137.226.113.56 attackbotsspam
4843/tcp 1883/tcp 8883/tcp...
[2020-06-14/08-11]44pkt,5pt.(tcp)
2020-08-12 07:49:20
137.226.113.56 attackspam
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [T]
2020-07-20 06:50:01
137.226.113.56 attackbots
Port Scan
...
2020-07-14 02:14:02
137.226.113.9 attackspambots
port scan and connect, tcp 443 (https)
2020-06-06 21:06:05
137.226.113.56 attackbots
srv02 Mass scanning activity detected Target: 102(iso-tsap) ..
2020-06-01 20:17:23
137.226.113.27 attackbots
mozilla/5.0+zgrab/0.x+(compatible;+researchscan/t12sns;++http://researchscan.comsys.rwth-aachen.de)
2020-05-31 07:27:51
137.226.113.31 attackspambots
*Port Scan* detected from 137.226.113.31 (DE/Germany/researchscan23.comsys.rwth-aachen.de). 5 hits in the last 35 seconds
2020-05-25 17:19:31
137.226.113.10 attack
137.226.113.10
2020-04-14 12:57:11
137.226.113.56 attack
Apr 13 15:48:24 debian-2gb-nbg1-2 kernel: \[9044698.686856\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.56 DST=195.201.40.59 LEN=64 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=TCP SPT=47703 DPT=102 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-14 01:14:48
137.226.113.56 attackbots
" "
2020-04-06 00:29:43
137.226.113.10 attack
Mar  5 21:51:17 debian-2gb-nbg1-2 kernel: \[5700646.129243\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.10 DST=195.201.40.59 LEN=1228 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=50832 DPT=443 LEN=1208
2020-03-06 05:32:53
137.226.113.56 attack
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 102 [J]
2020-03-03 00:36:56
137.226.113.56 attackbots
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [J]
2020-03-02 02:31:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.1.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.1.220.			IN	A

;; AUTHORITY SECTION:
.			311	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 15:42:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 220.1.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.1.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.122.213 attackbotsspam
May 16 02:33:40 ip-172-31-62-245 sshd\[31360\]: Invalid user csserver from 51.75.122.213\
May 16 02:33:42 ip-172-31-62-245 sshd\[31360\]: Failed password for invalid user csserver from 51.75.122.213 port 38996 ssh2\
May 16 02:37:23 ip-172-31-62-245 sshd\[31443\]: Invalid user Vie2 from 51.75.122.213\
May 16 02:37:25 ip-172-31-62-245 sshd\[31443\]: Failed password for invalid user Vie2 from 51.75.122.213 port 51620 ssh2\
May 16 02:41:05 ip-172-31-62-245 sshd\[31595\]: Invalid user ts3server from 51.75.122.213\
2020-05-16 18:16:39
94.191.111.115 attackspambots
May 16 04:08:58 srv-ubuntu-dev3 sshd[26281]: Invalid user office from 94.191.111.115
May 16 04:08:58 srv-ubuntu-dev3 sshd[26281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.111.115
May 16 04:08:58 srv-ubuntu-dev3 sshd[26281]: Invalid user office from 94.191.111.115
May 16 04:09:00 srv-ubuntu-dev3 sshd[26281]: Failed password for invalid user office from 94.191.111.115 port 38068 ssh2
May 16 04:11:42 srv-ubuntu-dev3 sshd[26743]: Invalid user cssserver from 94.191.111.115
May 16 04:11:42 srv-ubuntu-dev3 sshd[26743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.111.115
May 16 04:11:42 srv-ubuntu-dev3 sshd[26743]: Invalid user cssserver from 94.191.111.115
May 16 04:11:44 srv-ubuntu-dev3 sshd[26743]: Failed password for invalid user cssserver from 94.191.111.115 port 38622 ssh2
May 16 04:14:22 srv-ubuntu-dev3 sshd[27183]: Invalid user monitor from 94.191.111.115
...
2020-05-16 18:44:01
89.248.168.218 attack
05/15/2020-22:50:03.343328 89.248.168.218 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-16 18:45:26
162.243.137.124 attack
Port scan(s) [2 denied]
2020-05-16 18:54:57
134.122.117.242 attackbotsspam
Port scan denied
2020-05-16 18:19:30
182.48.101.178 attack
Invalid user cinema from 182.48.101.178 port 6506
2020-05-16 18:34:04
90.152.152.191 attackbotsspam
May 15 16:34:02 raspberrypi sshd\[26903\]: Failed password for pi from 90.152.152.191 port 46200 ssh2May 15 21:01:51 raspberrypi sshd\[3699\]: Failed password for pi from 90.152.152.191 port 44970 ssh2May 16 01:10:10 raspberrypi sshd\[11216\]: Failed password for pi from 90.152.152.191 port 39634 ssh2
...
2020-05-16 18:41:38
101.64.157.140 attackspambots
Spam sent to honeypot address
2020-05-16 18:12:25
51.79.53.106 attack
Invalid user ut3server from 51.79.53.106 port 44446
2020-05-16 18:14:04
132.232.29.210 attackspambots
Invalid user surf from 132.232.29.210 port 52882
2020-05-16 18:19:57
60.249.82.121 attack
Invalid user ddd from 60.249.82.121 port 58972
2020-05-16 18:53:42
167.71.38.64 attackspambots
May 16 03:35:18 root sshd[21245]: Invalid user luiz from 167.71.38.64
...
2020-05-16 18:33:11
107.182.182.88 attackbotsspam
Invalid user lq from 107.182.182.88 port 50704
2020-05-16 18:44:21
49.234.83.240 attackbotsspam
May 16 00:22:30 ip-172-31-62-245 sshd\[29729\]: Invalid user user from 49.234.83.240\
May 16 00:22:32 ip-172-31-62-245 sshd\[29729\]: Failed password for invalid user user from 49.234.83.240 port 40118 ssh2\
May 16 00:26:02 ip-172-31-62-245 sshd\[29775\]: Invalid user http from 49.234.83.240\
May 16 00:26:04 ip-172-31-62-245 sshd\[29775\]: Failed password for invalid user http from 49.234.83.240 port 40266 ssh2\
May 16 00:29:59 ip-172-31-62-245 sshd\[29803\]: Failed password for root from 49.234.83.240 port 40420 ssh2\
2020-05-16 18:59:15
54.37.149.233 attackspam
Brute force attempt
2020-05-16 18:12:57

Recently Reported IPs

185.16.38.112 43.134.31.33 137.226.1.226 137.226.1.224
137.226.1.223 184.75.214.163 156.146.63.158 137.226.1.192
137.226.1.193 5.167.64.33 129.146.241.147 137.226.1.197
171.244.201.101 137.226.1.201 5.167.64.45 193.142.146.213
89.58.38.0 137.226.2.79 5.167.64.69 137.226.2.81