Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.104.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.104.129.		IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 11:00:46 CST 2022
;; MSG SIZE  rcvd: 108
Host info
129.104.226.137.in-addr.arpa domain name pointer fw-dc-campus-vl172.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.104.226.137.in-addr.arpa	name = fw-dc-campus-vl172.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.44.139.12 attackspam
SSH
2020-08-13 12:08:12
103.25.132.42 attack
2020-08-13 12:05:49
122.192.206.80 attackbotsspam
2020-08-13 12:04:41
192.241.222.11 attackbots
SSH Bruteforce Attempt on Honeypot
2020-08-13 12:09:29
23.129.64.202 attack
Aug 13 05:57:16 ns382633 sshd\[27048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.202  user=root
Aug 13 05:57:18 ns382633 sshd\[27048\]: Failed password for root from 23.129.64.202 port 34796 ssh2
Aug 13 05:57:21 ns382633 sshd\[27048\]: Failed password for root from 23.129.64.202 port 34796 ssh2
Aug 13 05:57:24 ns382633 sshd\[27048\]: Failed password for root from 23.129.64.202 port 34796 ssh2
Aug 13 05:57:26 ns382633 sshd\[27048\]: Failed password for root from 23.129.64.202 port 34796 ssh2
2020-08-13 12:09:12
183.87.157.202 attackspambots
Aug 13 02:28:56 vpn01 sshd[13360]: Failed password for root from 183.87.157.202 port 57654 ssh2
...
2020-08-13 10:09:57
167.71.14.75 attackbotsspam
Port Scan
...
2020-08-13 12:19:25
106.12.218.2 attack
Aug 13 05:43:43 dev0-dcde-rnet sshd[24356]: Failed password for root from 106.12.218.2 port 55862 ssh2
Aug 13 05:58:24 dev0-dcde-rnet sshd[24563]: Failed password for root from 106.12.218.2 port 53754 ssh2
2020-08-13 12:05:06
178.128.232.77 attackspambots
Aug 13 06:08:03 piServer sshd[27760]: Failed password for root from 178.128.232.77 port 48906 ssh2
Aug 13 06:10:57 piServer sshd[28197]: Failed password for root from 178.128.232.77 port 39388 ssh2
...
2020-08-13 12:15:29
164.132.56.243 attackbots
Aug 13 03:08:49 nextcloud sshd\[27031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.243  user=root
Aug 13 03:08:51 nextcloud sshd\[27031\]: Failed password for root from 164.132.56.243 port 38629 ssh2
Aug 13 03:17:02 nextcloud sshd\[2129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.56.243  user=root
2020-08-13 10:15:28
106.13.68.145 attackbots
Bruteforce detected by fail2ban
2020-08-13 12:05:34
123.136.128.13 attack
Aug 13 04:16:56 fhem-rasp sshd[20412]: Invalid user calvin from 123.136.128.13 port 57812
...
2020-08-13 10:21:31
152.136.98.80 attackbotsspam
Aug 13 05:57:08 ns41 sshd[22201]: Failed password for root from 152.136.98.80 port 49478 ssh2
Aug 13 05:57:08 ns41 sshd[22201]: Failed password for root from 152.136.98.80 port 49478 ssh2
2020-08-13 12:18:29
111.160.216.147 attackspam
2020-08-13T05:50:05.129449vps773228.ovh.net sshd[31995]: Failed password for root from 111.160.216.147 port 43073 ssh2
2020-08-13T05:53:36.421644vps773228.ovh.net sshd[32031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.160.216.147  user=root
2020-08-13T05:53:38.303834vps773228.ovh.net sshd[32031]: Failed password for root from 111.160.216.147 port 33368 ssh2
2020-08-13T05:57:07.859126vps773228.ovh.net sshd[32061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.160.216.147  user=root
2020-08-13T05:57:10.042362vps773228.ovh.net sshd[32061]: Failed password for root from 111.160.216.147 port 48822 ssh2
...
2020-08-13 12:18:06
37.239.37.179 attackspam
2020-08-13 12:03:17

Recently Reported IPs

137.226.104.211 137.226.104.214 137.226.105.46 137.226.105.90
137.226.105.129 137.226.105.172 137.226.105.215 137.226.105.252
137.226.106.32 137.226.106.62 137.226.106.109 137.226.106.133
137.226.106.158 137.226.160.137 169.229.229.238 137.226.160.202
137.226.161.6 137.226.161.34 137.226.161.65 137.226.161.131