Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.124.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.124.55.			IN	A

;; AUTHORITY SECTION:
.			434	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 03:38:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 55.124.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 55.124.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.127.185.97 attack
Dec 20 09:26:28 ns381471 sshd[32473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.127.185.97
Dec 20 09:26:29 ns381471 sshd[32473]: Failed password for invalid user ob from 181.127.185.97 port 38088 ssh2
2019-12-20 16:53:12
77.247.108.92 attackbots
firewall-block, port(s): 5060/tcp, 5061/tcp, 5067/tcp, 5068/tcp, 5070/tcp, 5073/tcp, 5075/tcp, 5077/tcp, 5078/tcp, 5079/tcp, 5081/tcp, 5085/tcp, 5086/tcp, 5087/tcp, 5092/tcp, 5093/tcp, 5094/tcp, 5097/tcp, 5099/tcp
2019-12-20 16:43:56
40.92.69.27 attackspam
Dec 20 09:28:19 debian-2gb-vpn-nbg1-1 kernel: [1201658.953241] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.69.27 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=11822 DF PROTO=TCP SPT=1166 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-20 16:58:06
145.239.198.218 attackbotsspam
Dec 20 09:11:29 vps58358 sshd\[10690\]: Invalid user tantinews from 145.239.198.218Dec 20 09:11:30 vps58358 sshd\[10690\]: Failed password for invalid user tantinews from 145.239.198.218 port 41298 ssh2Dec 20 09:16:07 vps58358 sshd\[10724\]: Invalid user holaday from 145.239.198.218Dec 20 09:16:09 vps58358 sshd\[10724\]: Failed password for invalid user holaday from 145.239.198.218 port 59254 ssh2Dec 20 09:20:53 vps58358 sshd\[10754\]: Invalid user wwwrun from 145.239.198.218Dec 20 09:20:54 vps58358 sshd\[10754\]: Failed password for invalid user wwwrun from 145.239.198.218 port 48544 ssh2
...
2019-12-20 16:22:28
66.249.73.94 attackspam
[Fri Dec 20 13:28:53.123385 2019] [ssl:info] [pid 4961:tid 140345052436224] [client 66.249.73.94:48452] AH02033: No hostname was provided via SNI for a name based virtual host
...
2019-12-20 16:24:46
142.93.172.64 attackbotsspam
Dec 20 09:25:55 legacy sshd[29093]: Failed password for root from 142.93.172.64 port 36062 ssh2
Dec 20 09:33:03 legacy sshd[29427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.64
Dec 20 09:33:05 legacy sshd[29427]: Failed password for invalid user paypals from 142.93.172.64 port 44912 ssh2
...
2019-12-20 16:43:37
51.75.207.61 attackspam
sshd jail - ssh hack attempt
2019-12-20 16:30:31
218.92.0.178 attackspam
Dec 20 05:13:45 firewall sshd[22745]: Failed password for root from 218.92.0.178 port 3871 ssh2
Dec 20 05:13:48 firewall sshd[22745]: Failed password for root from 218.92.0.178 port 3871 ssh2
Dec 20 05:13:52 firewall sshd[22745]: Failed password for root from 218.92.0.178 port 3871 ssh2
...
2019-12-20 16:28:04
113.10.156.202 attackbots
Dec 20 07:19:53 legacy sshd[23991]: Failed password for root from 113.10.156.202 port 38536 ssh2
Dec 20 07:28:50 legacy sshd[24382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.10.156.202
Dec 20 07:28:53 legacy sshd[24382]: Failed password for invalid user templates from 113.10.156.202 port 44908 ssh2
...
2019-12-20 16:25:38
148.70.222.83 attackbots
Invalid user authur from 148.70.222.83 port 58848
2019-12-20 16:48:38
1.55.190.136 attack
Unauthorized connection attempt detected from IP address 1.55.190.136 to port 81
2019-12-20 16:56:17
54.37.157.41 attackbotsspam
Dec 20 09:11:35 localhost sshd\[18052\]: Invalid user ching from 54.37.157.41
Dec 20 09:11:35 localhost sshd\[18052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.41
Dec 20 09:11:38 localhost sshd\[18052\]: Failed password for invalid user ching from 54.37.157.41 port 42649 ssh2
Dec 20 09:16:27 localhost sshd\[18403\]: Invalid user admin from 54.37.157.41
Dec 20 09:16:27 localhost sshd\[18403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.157.41
...
2019-12-20 16:22:46
218.146.168.239 attackspam
Invalid user ubuntu from 218.146.168.239 port 34378
2019-12-20 16:48:14
23.11.230.37 attackbots
TCP Port Scanning
2019-12-20 16:30:57
86.238.30.51 attack
Invalid user vandendries from 86.238.30.51 port 46066
2019-12-20 16:41:50

Recently Reported IPs

137.226.123.228 137.226.124.119 137.226.124.76 238.189.54.197
137.226.124.178 137.226.124.218 137.226.125.5 137.226.125.94
137.226.125.134 137.226.126.10 137.226.126.150 137.226.126.162
221.235.224.14 137.226.123.156 137.226.130.92 137.226.124.19
137.226.124.111 137.226.127.244 137.226.128.156 137.226.129.148