Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.102.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.102.50.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062601 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 27 10:10:27 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 50.102.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.102.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.139 attack
 TCP (SYN) 80.82.77.139:29011 -> port 81, len 44
2020-08-16 01:06:54
157.230.132.100 attackbots
(sshd) Failed SSH login from 157.230.132.100 (US/United States/-): 5 in the last 3600 secs
2020-08-16 00:36:38
159.65.138.161 attack
firewall-block, port(s): 19424/tcp
2020-08-16 00:33:20
113.253.235.219 attackbotsspam
Port Scan
...
2020-08-16 00:30:06
213.177.107.170 attackbots
Dovecot Invalid User Login Attempt.
2020-08-16 00:54:10
103.102.116.18 attackspam
Repeated attempts to deliver spam
2020-08-16 00:55:33
103.145.13.12 attackspam
 TCP (SYN) 103.145.13.12:43891 -> port 5038, len 44
2020-08-16 00:40:26
95.249.244.9 attackspambots
20 attempts against mh-misbehave-ban on cedar
2020-08-16 00:29:02
46.59.65.88 attack
2020-08-15T14:41:28+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-16 00:30:53
47.88.153.61 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-08-16 00:38:29
205.201.72.251 attackbotsspam
Automatic report - Banned IP Access
2020-08-16 00:47:30
159.89.38.228 attackbotsspam
Aug 15 15:04:49 scw-tender-jepsen sshd[32302]: Failed password for root from 159.89.38.228 port 47580 ssh2
2020-08-16 00:48:57
157.33.157.216 attackspam
Automatic report - Port Scan Attack
2020-08-16 00:39:11
212.42.113.153 attack
Unauthorized connection attempt detected from IP address 212.42.113.153 to port 8080 [T]
2020-08-16 01:10:17
196.73.242.229 normal
MERCI
2020-08-16 00:51:16

Recently Reported IPs

39.99.210.30 169.229.48.218 169.229.140.13 169.229.139.232
169.229.94.128 180.76.150.79 72.208.26.244 77.137.74.16
60.172.152.163 88.124.188.118 101.100.166.140 137.226.17.192
137.226.23.41 171.223.227.14 137.226.60.21 137.226.31.99
180.76.8.61 137.226.177.157 137.226.198.164 131.161.92.224