Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.104.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.104.34.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 08:58:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
34.104.226.137.in-addr.arpa domain name pointer d-sp26.devlef.campus.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.104.226.137.in-addr.arpa	name = d-sp26.devlef.campus.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.220.101.46 attackspambots
Aug  1 07:38:51 hosting sshd[17869]: Invalid user fwupgrade from 185.220.101.46 port 37935
Aug  1 07:38:51 hosting sshd[17869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.46
Aug  1 07:38:51 hosting sshd[17869]: Invalid user fwupgrade from 185.220.101.46 port 37935
Aug  1 07:38:53 hosting sshd[17869]: Failed password for invalid user fwupgrade from 185.220.101.46 port 37935 ssh2
...
2019-08-01 13:27:49
180.167.233.250 attack
SSH/22 MH Probe, BF, Hack -
2019-08-01 13:03:04
180.248.166.192 attackbots
Unauthorized connection attempt from IP address 180.248.166.192 on Port 445(SMB)
2019-08-01 12:45:35
23.129.64.159 attack
Aug  1 05:31:46 bouncer sshd\[24550\]: Invalid user enisa from 23.129.64.159 port 42964
Aug  1 05:31:46 bouncer sshd\[24550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.159 
Aug  1 05:31:48 bouncer sshd\[24550\]: Failed password for invalid user enisa from 23.129.64.159 port 42964 ssh2
...
2019-08-01 12:53:36
54.38.18.211 attack
Aug  1 06:39:59 rpi sshd[17489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211 
Aug  1 06:40:02 rpi sshd[17489]: Failed password for invalid user dj from 54.38.18.211 port 48748 ssh2
2019-08-01 13:02:04
142.93.49.103 attack
Mar 19 10:15:44 vtv3 sshd\[8777\]: Invalid user admin from 142.93.49.103 port 38734
Mar 19 10:15:44 vtv3 sshd\[8777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Mar 19 10:15:46 vtv3 sshd\[8777\]: Failed password for invalid user admin from 142.93.49.103 port 38734 ssh2
Mar 19 10:19:35 vtv3 sshd\[10163\]: Invalid user zachary from 142.93.49.103 port 42266
Mar 19 10:19:35 vtv3 sshd\[10163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Apr  2 07:33:48 vtv3 sshd\[4081\]: Invalid user a from 142.93.49.103 port 55692
Apr  2 07:33:48 vtv3 sshd\[4081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.49.103
Apr  2 07:33:50 vtv3 sshd\[4081\]: Failed password for invalid user a from 142.93.49.103 port 55692 ssh2
Apr  2 07:39:25 vtv3 sshd\[6302\]: Invalid user ce from 142.93.49.103 port 34912
Apr  2 07:39:25 vtv3 sshd\[6302\]: pam_unix\(sshd:auth\):
2019-08-01 12:54:11
185.227.82.9 attackspambots
Aug  1 05:32:50 nginx sshd[75740]: error: PAM: authentication error for illegal user netscreen from 185.227.82.9
Aug  1 05:32:50 nginx sshd[75740]: Failed keyboard-interactive/pam for invalid user netscreen from 185.227.82.9 port 54964 ssh2
2019-08-01 13:07:01
121.123.6.162 attackbots
Unauthorized connection attempt from IP address 121.123.6.162 on Port 445(SMB)
2019-08-01 13:14:07
142.93.18.15 attack
SSH Brute Force
2019-08-01 12:47:07
125.197.172.213 attackspambots
Port Scan: TCP/445
2019-08-01 13:20:50
64.113.32.29 attack
Aug  1 05:59:49 jane sshd\[26008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.32.29  user=root
Aug  1 05:59:50 jane sshd\[26008\]: Failed password for root from 64.113.32.29 port 46249 ssh2
Aug  1 05:59:55 jane sshd\[26101\]: Invalid user admin from 64.113.32.29 port 32804
Aug  1 05:59:55 jane sshd\[26101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.32.29
...
2019-08-01 13:08:27
180.252.57.141 attackspambots
Unauthorized connection attempt from IP address 180.252.57.141 on Port 445(SMB)
2019-08-01 12:59:29
87.236.233.182 attack
Unauthorized connection attempt from IP address 87.236.233.182 on Port 445(SMB)
2019-08-01 13:07:40
23.129.64.189 attackspam
Aug  1 06:05:52 vpn01 sshd\[10559\]: Invalid user administrator from 23.129.64.189
Aug  1 06:05:52 vpn01 sshd\[10559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.189
Aug  1 06:05:54 vpn01 sshd\[10559\]: Failed password for invalid user administrator from 23.129.64.189 port 22912 ssh2
2019-08-01 12:44:44
5.158.11.91 attackbotsspam
23/tcp
[2019-08-01]1pkt
2019-08-01 12:47:47

Recently Reported IPs

137.226.252.96 165.232.189.165 82.42.119.108 137.226.20.88
167.172.84.100 137.226.14.31 137.226.108.247 88.104.78.184
188.59.20.28 81.70.52.162 137.226.82.173 186.226.4.71
189.178.164.123 184.103.63.208 169.229.134.203 14.241.71.65
169.229.134.248 137.226.238.4 169.229.135.1 141.212.122.135