Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.139.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.139.209.		IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 173 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 09:03:44 CST 2022
;; MSG SIZE  rcvd: 108
Host info
209.139.226.137.in-addr.arpa domain name pointer n7k-sw23-1-et3-21.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
209.139.226.137.in-addr.arpa	name = n7k-sw23-1-et3-21.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.115.15.210 attack
odoo8
...
2020-04-08 20:46:23
128.71.230.20 attack
honeypot forum registration (user=3aplus63Creef; email=sam@3aplus63.ru)
2020-04-08 20:48:54
187.217.199.20 attack
Apr  8 08:50:45 ns392434 sshd[24284]: Invalid user pireys from 187.217.199.20 port 37608
Apr  8 08:50:45 ns392434 sshd[24284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20
Apr  8 08:50:45 ns392434 sshd[24284]: Invalid user pireys from 187.217.199.20 port 37608
Apr  8 08:50:47 ns392434 sshd[24284]: Failed password for invalid user pireys from 187.217.199.20 port 37608 ssh2
Apr  8 08:58:21 ns392434 sshd[24458]: Invalid user postgres from 187.217.199.20 port 60852
Apr  8 08:58:21 ns392434 sshd[24458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.199.20
Apr  8 08:58:21 ns392434 sshd[24458]: Invalid user postgres from 187.217.199.20 port 60852
Apr  8 08:58:22 ns392434 sshd[24458]: Failed password for invalid user postgres from 187.217.199.20 port 60852 ssh2
Apr  8 09:02:39 ns392434 sshd[24630]: Invalid user newuser from 187.217.199.20 port 43686
2020-04-08 20:44:08
185.22.142.132 attackspambots
Apr  8 14:38:03 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.132, lip=176.9.177.164, session=\
Apr  8 14:38:05 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.132, lip=176.9.177.164, session=\
Apr  8 14:38:27 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.132, lip=176.9.177.164, session=\
Apr  8 14:43:37 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.132, lip=176.9.177.164, session=\
Apr  8 14:43:39 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180
...
2020-04-08 20:57:58
183.89.212.35 attack
Dovecot Invalid User Login Attempt.
2020-04-08 20:48:18
37.187.5.137 attackbotsspam
Apr  8 16:05:15 lukav-desktop sshd\[1023\]: Invalid user ubuntu from 37.187.5.137
Apr  8 16:05:15 lukav-desktop sshd\[1023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.5.137
Apr  8 16:05:17 lukav-desktop sshd\[1023\]: Failed password for invalid user ubuntu from 37.187.5.137 port 39120 ssh2
Apr  8 16:11:33 lukav-desktop sshd\[18170\]: Invalid user odoo from 37.187.5.137
Apr  8 16:11:33 lukav-desktop sshd\[18170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.5.137
2020-04-08 21:15:21
141.98.81.107 attackspam
Apr  8 12:42:51 game-panel sshd[8138]: Failed password for root from 141.98.81.107 port 36383 ssh2
Apr  8 12:43:28 game-panel sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.107
Apr  8 12:43:30 game-panel sshd[8197]: Failed password for invalid user admin from 141.98.81.107 port 42227 ssh2
2020-04-08 21:06:29
112.85.42.172 attackbots
$f2bV_matches
2020-04-08 21:07:06
23.254.225.52 attackbotsspam
[portscan] Port scan
2020-04-08 21:20:35
164.77.52.227 attack
Apr  8 12:34:52 game-panel sshd[7733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.52.227
Apr  8 12:34:53 game-panel sshd[7733]: Failed password for invalid user vagrant from 164.77.52.227 port 48644 ssh2
Apr  8 12:43:46 game-panel sshd[8227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.52.227
2020-04-08 20:52:21
45.133.99.7 attack
Email spam @ 2020-04-08 14:05:22
2020-04-08 21:08:37
222.186.180.17 attack
SSH brute force attempt @ 2020-04-08 14:08:13
2020-04-08 21:18:20
36.77.31.249 attackspambots
Unauthorized connection attempt from IP address 36.77.31.249 on Port 445(SMB)
2020-04-08 20:45:18
91.209.54.54 attack
Apr  8 15:29:17 hosting sshd[29829]: Invalid user soporte from 91.209.54.54 port 34125
Apr  8 15:29:17 hosting sshd[29829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.209.54.54
Apr  8 15:29:17 hosting sshd[29829]: Invalid user soporte from 91.209.54.54 port 34125
Apr  8 15:29:19 hosting sshd[29829]: Failed password for invalid user soporte from 91.209.54.54 port 34125 ssh2
Apr  8 15:43:44 hosting sshd[31246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.209.54.54  user=postgres
Apr  8 15:43:46 hosting sshd[31246]: Failed password for postgres from 91.209.54.54 port 44923 ssh2
...
2020-04-08 20:52:04
89.187.86.6 attack
Potential Directory Traversal Attempt.
2020-04-08 20:42:09

Recently Reported IPs

137.226.139.82 137.226.139.246 137.226.140.61 137.226.140.144
64.86.183.132 141.63.145.175 137.226.141.20 137.226.153.227
169.229.233.186 169.229.145.249 20.204.136.93 23.124.121.5
137.226.144.188 137.226.146.254 137.226.147.220 124.116.90.58
137.226.140.160 137.226.151.152 137.226.151.159 137.226.151.170