Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.108.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.108.12.			IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 11:04:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
12.108.226.137.in-addr.arpa domain name pointer ip1-12.halifax.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.108.226.137.in-addr.arpa	name = ip1-12.halifax.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.42.125.170 attack
Invalid user admin from 118.42.125.170 port 41076
2020-01-10 23:11:35
211.75.194.80 attackspam
Jan 10 16:20:14 * sshd[7386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
Jan 10 16:20:16 * sshd[7386]: Failed password for invalid user setup from 211.75.194.80 port 37614 ssh2
2020-01-10 23:38:39
129.226.174.139 attack
Invalid user student from 129.226.174.139 port 57270
2020-01-10 23:43:04
5.196.116.202 attackbots
Invalid user odoo from 5.196.116.202 port 45400
2020-01-10 23:37:21
106.12.74.141 attackspam
Invalid user nd from 106.12.74.141 port 48526
2020-01-10 23:17:29
51.254.51.182 attackspam
...
2020-01-10 23:27:22
49.234.64.252 attack
Invalid user yura from 49.234.64.252 port 34866
2020-01-10 23:28:58
197.42.26.30 attack
Invalid user admin from 197.42.26.30 port 36761
2020-01-10 23:38:57
36.73.133.40 attackspam
Invalid user msfadmin from 36.73.133.40 port 53165
2020-01-10 23:32:58
86.21.205.149 attackbots
Invalid user myz from 86.21.205.149 port 48050
2020-01-10 23:22:02
91.212.150.147 attack
Invalid user test from 91.212.150.147 port 43876
2020-01-10 23:48:37
117.247.253.2 attackspam
Invalid user iws from 117.247.253.2 port 33822
2020-01-10 23:12:17
152.136.76.134 attackspam
Invalid user z from 152.136.76.134 port 39859
2020-01-10 23:05:46
14.169.154.129 attackspambots
Invalid user admin from 14.169.154.129 port 44361
2020-01-10 23:36:29
115.79.36.159 attack
Invalid user admin from 115.79.36.159 port 38733
2020-01-10 23:45:08

Recently Reported IPs

137.226.107.213 137.226.108.101 137.226.108.74 137.226.108.184
137.226.108.203 137.226.108.227 137.226.109.6 137.226.109.94
137.226.109.52 137.226.109.119 137.226.109.137 137.226.109.182
137.226.109.231 137.226.109.253 137.226.109.192 137.226.110.7
137.226.110.16 137.226.110.82 169.229.146.65 169.229.147.250