Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.10.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.10.145.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 16:07:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
145.10.226.137.in-addr.arpa domain name pointer ibf-145.ibf.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.10.226.137.in-addr.arpa	name = ibf-145.ibf.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
67.55.92.89 attack
Sep 12 15:18:28 ms-srv sshd[4902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89
Sep 12 15:18:29 ms-srv sshd[4902]: Failed password for invalid user arkserver from 67.55.92.89 port 42398 ssh2
2020-02-16 02:28:26
185.230.82.40 attack
2020-02-15T12:04:49.8794861495-001 sshd[48327]: Invalid user lee from 185.230.82.40 port 47384
2020-02-15T12:04:49.8833341495-001 sshd[48327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.230.82.40
2020-02-15T12:04:49.8794861495-001 sshd[48327]: Invalid user lee from 185.230.82.40 port 47384
2020-02-15T12:04:52.2455911495-001 sshd[48327]: Failed password for invalid user lee from 185.230.82.40 port 47384 ssh2
2020-02-15T12:13:06.5381651495-001 sshd[48632]: Invalid user chiles from 185.230.82.40 port 44216
2020-02-15T12:13:06.5420221495-001 sshd[48632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.230.82.40
2020-02-15T12:13:06.5381651495-001 sshd[48632]: Invalid user chiles from 185.230.82.40 port 44216
2020-02-15T12:13:08.4676171495-001 sshd[48632]: Failed password for invalid user chiles from 185.230.82.40 port 44216 ssh2
2020-02-15T12:21:19.1159251495-001 sshd[49029]: pam_unix(sshd:auth): au
...
2020-02-16 02:27:09
211.232.39.8 attackbotsspam
Nov 17 15:08:35 ms-srv sshd[3733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.232.39.8
Nov 17 15:08:36 ms-srv sshd[3733]: Failed password for invalid user test from 211.232.39.8 port 35938 ssh2
2020-02-16 01:41:19
211.200.220.142 attackbotsspam
Mar 14 19:27:38 ms-srv sshd[53556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.200.220.142  user=root
Mar 14 19:27:39 ms-srv sshd[53556]: Failed password for invalid user root from 211.200.220.142 port 49970 ssh2
2020-02-16 02:09:15
118.40.66.67 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 02:11:57
35.238.158.77 attackbotsspam
python-requests/2.22.0
2020-02-16 01:48:18
118.41.121.156 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 01:59:14
149.202.13.41 attackspambots
Feb 10 18:45:19 m3 sshd[7666]: Invalid user nmk from 149.202.13.41
Feb 10 18:45:21 m3 sshd[7666]: Failed password for invalid user nmk from 149.202.13.41 port 52512 ssh2
Feb 10 18:54:53 m3 sshd[8700]: Invalid user qz from 149.202.13.41


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=149.202.13.41
2020-02-16 01:58:23
158.69.192.83 attackbotsspam
Invalid user weng from 158.69.192.83 port 32775
2020-02-16 01:50:43
77.222.139.14 attackbots
DATE:2020-02-15 15:06:06, IP:77.222.139.14, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-16 02:11:19
118.41.173.202 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 01:41:52
211.231.49.102 attackbotsspam
Dec 18 06:41:14 ms-srv sshd[59554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.231.49.102
Dec 18 06:41:16 ms-srv sshd[59554]: Failed password for invalid user mchan from 211.231.49.102 port 1780 ssh2
2020-02-16 01:42:09
211.23.3.13 attackspambots
Feb  1 17:37:24 ms-srv sshd[56781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.3.13
Feb  1 17:37:26 ms-srv sshd[56781]: Failed password for invalid user ubuntu from 211.23.3.13 port 33051 ssh2
2020-02-16 01:44:36
123.193.146.240 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 01:53:56
211.23.125.95 attackspambots
Brute-force attempt banned
2020-02-16 01:47:05

Recently Reported IPs

5.167.70.84 34.159.131.185 137.226.10.205 20.58.60.157
137.226.11.43 161.35.97.111 20.115.75.130 200.225.247.53
137.226.144.76 34.176.79.183 20.24.84.0 36.255.220.101
222.106.198.35 37.153.40.181 159.203.7.136 137.226.60.240
20.226.9.239 20.25.69.141 5.167.69.244 18.235.187.144