Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
137.226.113.10 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-12 01:59:28
137.226.113.10 attackbots
Port scan denied
2020-09-11 17:50:45
137.226.113.56 attackbotsspam
4843/tcp 1883/tcp 8883/tcp...
[2020-06-14/08-11]44pkt,5pt.(tcp)
2020-08-12 07:49:20
137.226.113.56 attackspam
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [T]
2020-07-20 06:50:01
137.226.113.56 attackbots
Port Scan
...
2020-07-14 02:14:02
137.226.113.9 attackspambots
port scan and connect, tcp 443 (https)
2020-06-06 21:06:05
137.226.113.56 attackbots
srv02 Mass scanning activity detected Target: 102(iso-tsap) ..
2020-06-01 20:17:23
137.226.113.27 attackbots
mozilla/5.0+zgrab/0.x+(compatible;+researchscan/t12sns;++http://researchscan.comsys.rwth-aachen.de)
2020-05-31 07:27:51
137.226.113.31 attackspambots
*Port Scan* detected from 137.226.113.31 (DE/Germany/researchscan23.comsys.rwth-aachen.de). 5 hits in the last 35 seconds
2020-05-25 17:19:31
137.226.113.10 attack
137.226.113.10
2020-04-14 12:57:11
137.226.113.56 attack
Apr 13 15:48:24 debian-2gb-nbg1-2 kernel: \[9044698.686856\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.56 DST=195.201.40.59 LEN=64 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=TCP SPT=47703 DPT=102 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-14 01:14:48
137.226.113.56 attackbots
" "
2020-04-06 00:29:43
137.226.113.10 attack
Mar  5 21:51:17 debian-2gb-nbg1-2 kernel: \[5700646.129243\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=137.226.113.10 DST=195.201.40.59 LEN=1228 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=50832 DPT=443 LEN=1208
2020-03-06 05:32:53
137.226.113.56 attack
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 102 [J]
2020-03-03 00:36:56
137.226.113.56 attackbots
Unauthorized connection attempt detected from IP address 137.226.113.56 to port 4840 [J]
2020-03-02 02:31:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.11.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.11.89.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 10:24:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
89.11.226.137.in-addr.arpa domain name pointer glas09.ghi.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
89.11.226.137.in-addr.arpa	name = glas09.ghi.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.59.153.48 attackbotsspam
Automatic report - Port Scan Attack
2019-12-12 18:46:53
185.200.118.72 attack
1080/tcp 3389/tcp 3128/tcp...
[2019-10-12/12-12]49pkt,4pt.(tcp),1pt.(udp)
2019-12-12 18:50:18
185.176.27.6 attack
Dec 12 11:28:20 mc1 kernel: \[305335.535147\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=24159 PROTO=TCP SPT=56500 DPT=33019 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 12 11:32:25 mc1 kernel: \[305579.884122\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=12056 PROTO=TCP SPT=56500 DPT=33037 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 12 11:36:41 mc1 kernel: \[305835.987439\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=58576 PROTO=TCP SPT=56500 DPT=33689 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-12 18:44:25
51.68.220.249 attackbots
Dec 12 05:43:22 ny01 sshd[1444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.220.249
Dec 12 05:43:25 ny01 sshd[1444]: Failed password for invalid user rpc from 51.68.220.249 port 59340 ssh2
Dec 12 05:52:24 ny01 sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.220.249
2019-12-12 19:15:47
59.144.137.134 attack
Dec 12 06:18:14 hcbbdb sshd\[3585\]: Invalid user zonaWifi from 59.144.137.134
Dec 12 06:18:14 hcbbdb sshd\[3585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.137.134
Dec 12 06:18:16 hcbbdb sshd\[3585\]: Failed password for invalid user zonaWifi from 59.144.137.134 port 10038 ssh2
Dec 12 06:25:57 hcbbdb sshd\[5333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.137.134  user=root
Dec 12 06:25:59 hcbbdb sshd\[5333\]: Failed password for root from 59.144.137.134 port 32382 ssh2
2019-12-12 19:04:58
85.112.51.17 attackbotsspam
1576131881 - 12/12/2019 07:24:41 Host: 85.112.51.17/85.112.51.17 Port: 445 TCP Blocked
2019-12-12 19:09:25
14.232.106.195 attack
1576131839 - 12/12/2019 07:23:59 Host: 14.232.106.195/14.232.106.195 Port: 445 TCP Blocked
2019-12-12 19:19:24
163.47.214.158 attackbots
Dec 12 10:07:19 server sshd\[8117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158  user=root
Dec 12 10:07:22 server sshd\[8117\]: Failed password for root from 163.47.214.158 port 56098 ssh2
Dec 12 10:17:46 server sshd\[11228\]: Invalid user tubate from 163.47.214.158
Dec 12 10:17:46 server sshd\[11228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158 
Dec 12 10:17:48 server sshd\[11228\]: Failed password for invalid user tubate from 163.47.214.158 port 33156 ssh2
...
2019-12-12 18:56:56
146.0.142.68 attackbotsspam
Dec 12 12:21:01 ncomp sshd[18638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.142.68  user=root
Dec 12 12:21:04 ncomp sshd[18638]: Failed password for root from 146.0.142.68 port 55720 ssh2
Dec 12 12:33:02 ncomp sshd[18777]: Invalid user not from 146.0.142.68
2019-12-12 18:48:42
189.41.92.123 attack
1576131873 - 12/12/2019 07:24:33 Host: 189.41.92.123/189.41.92.123 Port: 445 TCP Blocked
2019-12-12 19:12:00
59.127.228.147 attack
Dec 12 07:26:06 debian-2gb-nbg1-2 kernel: \[24413506.095066\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=59.127.228.147 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=24672 PROTO=TCP SPT=25865 DPT=23 WINDOW=32273 RES=0x00 SYN URGP=0
2019-12-12 18:56:35
202.103.254.181 attackspam
Dec 12 09:17:36 vtv3 sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.254.181 
Dec 12 09:17:38 vtv3 sshd[11302]: Failed password for invalid user qhfc from 202.103.254.181 port 52706 ssh2
Dec 12 09:25:37 vtv3 sshd[15100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.254.181 
Dec 12 09:39:27 vtv3 sshd[21417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.254.181 
Dec 12 09:39:29 vtv3 sshd[21417]: Failed password for invalid user webmaster from 202.103.254.181 port 59112 ssh2
Dec 12 09:46:11 vtv3 sshd[24862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.254.181 
Dec 12 09:58:38 vtv3 sshd[30818]: Failed password for root from 202.103.254.181 port 37130 ssh2
Dec 12 10:05:06 vtv3 sshd[1563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.103.254.181 
Dec 12 10:0
2019-12-12 18:43:57
66.70.189.236 attackbotsspam
Dec 12 07:55:55 microserver sshd[5096]: Invalid user Romantic2017 from 66.70.189.236 port 60356
Dec 12 07:55:55 microserver sshd[5096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236
Dec 12 07:55:56 microserver sshd[5096]: Failed password for invalid user Romantic2017 from 66.70.189.236 port 60356 ssh2
Dec 12 08:01:16 microserver sshd[5904]: Invalid user brianna from 66.70.189.236 port 40750
Dec 12 08:01:16 microserver sshd[5904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236
Dec 12 08:11:43 microserver sshd[7531]: Invalid user towers from 66.70.189.236 port 57992
Dec 12 08:11:43 microserver sshd[7531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236
Dec 12 08:11:45 microserver sshd[7531]: Failed password for invalid user towers from 66.70.189.236 port 57992 ssh2
Dec 12 08:16:59 microserver sshd[8353]: Invalid user n123tra7 from 66.70.189.236 port
2019-12-12 18:49:55
115.74.94.181 attack
1576131896 - 12/12/2019 07:24:56 Host: 115.74.94.181/115.74.94.181 Port: 445 TCP Blocked
2019-12-12 19:03:29
107.161.91.203 attack
Dec 11 22:57:49 php1 sshd\[8772\]: Invalid user sugiura from 107.161.91.203
Dec 11 22:57:49 php1 sshd\[8772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.91.203
Dec 11 22:57:52 php1 sshd\[8772\]: Failed password for invalid user sugiura from 107.161.91.203 port 49164 ssh2
Dec 11 23:03:06 php1 sshd\[9450\]: Invalid user dave from 107.161.91.203
Dec 11 23:03:06 php1 sshd\[9450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.91.203
2019-12-12 19:19:56

Recently Reported IPs

137.226.11.49 137.226.11.52 43.154.166.195 120.48.27.88
43.154.69.93 43.156.126.121 82.166.39.15 38.44.95.117
146.56.99.136 43.129.203.45 43.154.52.41 180.76.99.179
137.226.10.254 137.226.11.30 181.30.39.106 204.44.70.38
36.227.217.36 137.226.10.84 43.154.47.210 193.32.126.153