Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.123.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.123.104.		IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 08:03:16 CST 2022
;; MSG SIZE  rcvd: 108
Host info
104.123.226.137.in-addr.arpa domain name pointer vpn-zugang29.gi.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.123.226.137.in-addr.arpa	name = vpn-zugang29.gi.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.203.240.76 attackbots
Dec 14 10:05:43 plusreed sshd[20728]: Invalid user bbs from 119.203.240.76
Dec 14 10:05:43 plusreed sshd[20728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.240.76
Dec 14 10:05:43 plusreed sshd[20728]: Invalid user bbs from 119.203.240.76
Dec 14 10:05:44 plusreed sshd[20728]: Failed password for invalid user bbs from 119.203.240.76 port 51126 ssh2
...
2019-12-14 23:24:00
80.82.77.234 attackbotsspam
Port scan on 8 port(s): 60102 61131 61701 61859 62146 63819 64149 65467
2019-12-14 23:07:51
218.1.18.78 attackbots
Dec 14 15:46:34 amit sshd\[25627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78  user=mysql
Dec 14 15:46:36 amit sshd\[25627\]: Failed password for mysql from 218.1.18.78 port 51593 ssh2
Dec 14 15:54:02 amit sshd\[14249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78  user=root
...
2019-12-14 23:19:24
189.126.19.145 attack
Unauthorized connection attempt from IP address 189.126.19.145 on Port 445(SMB)
2019-12-14 22:53:25
152.136.86.234 attack
Dec 14 15:36:12 h2177944 sshd\[21412\]: Invalid user test from 152.136.86.234 port 45594
Dec 14 15:36:12 h2177944 sshd\[21412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.86.234
Dec 14 15:36:13 h2177944 sshd\[21412\]: Failed password for invalid user test from 152.136.86.234 port 45594 ssh2
Dec 14 15:45:21 h2177944 sshd\[21756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.86.234  user=smmsp
...
2019-12-14 23:18:06
61.180.65.188 attackbotsspam
Dec 14 01:17:28 eola postfix/smtpd[14178]: connect from unknown[61.180.65.188]
Dec 14 01:17:29 eola postfix/smtpd[14178]: lost connection after AUTH from unknown[61.180.65.188]
Dec 14 01:17:29 eola postfix/smtpd[14178]: disconnect from unknown[61.180.65.188] ehlo=1 auth=0/1 commands=1/2
Dec 14 01:17:33 eola postfix/smtpd[14178]: connect from unknown[61.180.65.188]
Dec 14 01:17:34 eola postfix/smtpd[14187]: connect from unknown[61.180.65.188]
Dec 14 01:17:35 eola postfix/smtpd[14187]: lost connection after AUTH from unknown[61.180.65.188]
Dec 14 01:17:35 eola postfix/smtpd[14187]: disconnect from unknown[61.180.65.188] ehlo=1 auth=0/1 commands=1/2
Dec 14 01:17:35 eola postfix/smtpd[14187]: connect from unknown[61.180.65.188]
Dec 14 01:17:37 eola postfix/smtpd[14178]: lost connection after AUTH from unknown[61.180.65.188]
Dec 14 01:17:37 eola postfix/smtpd[14178]: disconnect from unknown[61.180.65.188] ehlo=1 auth=0/1 commands=1/2
Dec 14 01:17:38 eola postfix/smtpd[14187]........
-------------------------------
2019-12-14 22:45:52
222.186.175.169 attack
Dec 14 10:00:30 TORMINT sshd\[32493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Dec 14 10:00:32 TORMINT sshd\[32493\]: Failed password for root from 222.186.175.169 port 33062 ssh2
Dec 14 10:00:50 TORMINT sshd\[32504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
...
2019-12-14 23:04:54
58.126.201.20 attackspambots
Dec 14 04:28:32 kapalua sshd\[21612\]: Invalid user xmuser from 58.126.201.20
Dec 14 04:28:32 kapalua sshd\[21612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.126.201.20
Dec 14 04:28:34 kapalua sshd\[21612\]: Failed password for invalid user xmuser from 58.126.201.20 port 38864 ssh2
Dec 14 04:35:31 kapalua sshd\[22232\]: Invalid user jamie from 58.126.201.20
Dec 14 04:35:31 kapalua sshd\[22232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.126.201.20
2019-12-14 22:42:21
219.65.46.210 attackbotsspam
Unauthorized connection attempt from IP address 219.65.46.210 on Port 445(SMB)
2019-12-14 23:13:06
116.111.126.114 attackbotsspam
Unauthorized connection attempt from IP address 116.111.126.114 on Port 445(SMB)
2019-12-14 23:22:04
185.143.223.128 attackspam
Port scan on 8 port(s): 10077 10287 10377 10451 10538 10544 10556 10667
2019-12-14 22:58:54
182.253.86.74 attackbotsspam
Unauthorized connection attempt from IP address 182.253.86.74 on Port 445(SMB)
2019-12-14 23:23:34
40.73.116.245 attack
Dec 14 20:15:55 areeb-Workstation sshd[31440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245 
Dec 14 20:15:58 areeb-Workstation sshd[31440]: Failed password for invalid user ehi from 40.73.116.245 port 56192 ssh2
...
2019-12-14 22:55:37
181.49.117.166 attack
Dec 14 10:05:27 plusreed sshd[20709]: Invalid user iulian from 181.49.117.166
...
2019-12-14 23:21:14
190.153.249.99 attack
Dec 14 15:21:47 sso sshd[24321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.153.249.99
Dec 14 15:21:49 sso sshd[24321]: Failed password for invalid user brothel from 190.153.249.99 port 60405 ssh2
...
2019-12-14 22:43:30

Recently Reported IPs

216.151.137.3 137.226.149.203 137.226.160.38 137.226.161.134
180.76.28.200 180.76.29.230 180.76.30.38 180.76.31.86
169.229.205.154 169.229.158.183 137.226.212.183 169.229.159.197
180.76.26.173 169.229.193.130 169.229.193.199 180.76.26.208
137.226.149.153 137.226.149.209 137.226.160.177 216.152.249.221