Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.105.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.105.154.		IN	A

;; AUTHORITY SECTION:
.			416	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 09:36:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
154.105.226.137.in-addr.arpa domain name pointer natrium.i6.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.105.226.137.in-addr.arpa	name = natrium.i6.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.71.210.206 attackspambots
Unauthorized connection attempt from IP address 118.71.210.206 on Port 445(SMB)
2020-05-05 22:46:51
118.101.24.69 attackbotsspam
Automatic report - Port Scan Attack
2020-05-05 22:25:49
178.128.21.38 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "anthony" at 2020-05-05T10:40:51Z
2020-05-05 22:32:56
36.32.3.108 attackspambots
Scanning
2020-05-05 22:27:12
190.207.72.28 attackspambots
Honeypot attack, port: 445, PTR: 190-207-72-28.dyn.dsl.cantv.net.
2020-05-05 22:30:03
14.161.22.159 attackspam
1588670200 - 05/05/2020 11:16:40 Host: 14.161.22.159/14.161.22.159 Port: 445 TCP Blocked
2020-05-05 22:16:46
113.200.160.138 attackbots
SSH/22 MH Probe, BF, Hack -
2020-05-05 22:09:21
218.92.0.172 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-05 22:49:50
116.103.153.229 attackspambots
Unauthorized connection attempt from IP address 116.103.153.229 on Port 445(SMB)
2020-05-05 22:49:13
64.225.114.81 attackbots
firewall-block, port(s): 1088/tcp
2020-05-05 22:23:02
117.50.126.15 attackbots
$f2bV_matches
2020-05-05 22:09:01
116.118.2.3 attack
May  5 11:16:36 dev0-dcde-rnet sshd[17747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.118.2.3
May  5 11:16:36 dev0-dcde-rnet sshd[17748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.118.2.3
May  5 11:16:38 dev0-dcde-rnet sshd[17747]: Failed password for invalid user pi from 116.118.2.3 port 44660 ssh2
2020-05-05 22:43:51
125.22.9.186 attackspambots
Brute-force attempt banned
2020-05-05 22:27:35
46.32.250.31 attackbotsspam
Unauthorized connection attempt from IP address 46.32.250.31 on Port 445(SMB)
2020-05-05 22:46:17
51.75.140.153 attack
2020-05-05T11:49:28.106445upcloud.m0sh1x2.com sshd[1197]: Invalid user selma from 51.75.140.153 port 55566
2020-05-05 22:19:38

Recently Reported IPs

180.76.142.2 137.226.147.50 137.226.159.168 190.104.73.152
179.32.18.230 190.215.30.147 189.112.150.131 137.226.100.210
137.226.209.178 137.226.210.114 180.76.142.13 181.48.105.26
180.76.5.213 180.76.109.235 180.76.142.41 137.226.74.118
137.226.75.137 137.226.65.102 193.80.115.4 180.76.183.206