Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.129.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.129.149.		IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 04:54:35 CST 2022
;; MSG SIZE  rcvd: 108
Host info
149.129.226.137.in-addr.arpa domain name pointer neodym.iehk.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.129.226.137.in-addr.arpa	name = neodym.iehk.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.185.149.129 attackspam
20/2/7@17:36:49: FAIL: Alarm-Network address from=186.185.149.129
20/2/7@17:36:49: FAIL: Alarm-Network address from=186.185.149.129
...
2020-02-08 09:25:29
51.68.139.232 attackspam
Email rejected due to spam filtering
2020-02-08 09:22:01
77.42.88.101 attack
port 23
2020-02-08 09:47:38
129.211.30.94 attackbotsspam
Feb  7 17:48:06 dallas01 sshd[19347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.30.94
Feb  7 17:48:08 dallas01 sshd[19347]: Failed password for invalid user ypq from 129.211.30.94 port 36774 ssh2
Feb  7 17:51:38 dallas01 sshd[19745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.30.94
2020-02-08 09:46:02
92.83.108.192 attackspambots
Automatic report - Port Scan Attack
2020-02-08 09:47:20
41.139.12.151 attackspambots
SMB Server BruteForce Attack
2020-02-08 09:24:01
51.89.64.17 attackbotsspam
1 attempts against mh-modsecurity-ban on ice
2020-02-08 09:21:45
197.159.141.34 attackbots
Telnet Server BruteForce Attack
2020-02-08 09:28:22
220.181.108.90 attackspambots
Bad bot/spoofed identity
2020-02-08 09:34:20
181.44.119.106 attackspambots
Email rejected due to spam filtering
2020-02-08 09:42:56
188.73.244.168 attackbotsspam
Email rejected due to spam filtering
2020-02-08 09:44:51
152.0.56.194 attackbotsspam
Email rejected due to spam filtering
2020-02-08 09:43:31
103.15.106.120 attackbots
Port probing on unauthorized port 1433
2020-02-08 09:36:40
138.97.87.105 attackspambots
Email rejected due to spam filtering
2020-02-08 09:39:02
112.134.226.122 attack
SMB Server BruteForce Attack
2020-02-08 09:21:19

Recently Reported IPs

137.226.129.68 137.226.130.158 137.226.123.189 137.226.123.232
137.226.124.59 137.226.125.26 137.226.125.155 137.226.125.198
137.226.126.58 137.226.126.180 137.226.126.217 137.226.127.10
137.226.127.63 137.226.127.120 137.226.127.146 137.226.127.158
137.226.128.11 137.226.128.39 137.226.129.25 137.226.131.35