Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.139.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.139.216.		IN	A

;; AUTHORITY SECTION:
.			322	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 09:46:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 216.139.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.139.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.222.71.110 attack
PHP DIESCAN Information Disclosure Vulnerability
2019-11-10 04:59:57
218.92.0.202 attackbots
Nov  9 21:17:25 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
Nov  9 21:17:28 MK-Soft-Root1 sshd[22999]: Failed password for root from 218.92.0.202 port 19370 ssh2
...
2019-11-10 04:52:16
3.124.221.134 attackbotsspam
Brute forcing RDP port 3389
2019-11-10 05:22:55
61.222.56.80 attackspambots
Nov  9 20:28:18 MK-Soft-Root2 sshd[19437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80 
Nov  9 20:28:20 MK-Soft-Root2 sshd[19437]: Failed password for invalid user 1234@1234a from 61.222.56.80 port 49654 ssh2
...
2019-11-10 05:09:38
197.156.80.4 attack
Unauthorized connection attempt from IP address 197.156.80.4 on Port 445(SMB)
2019-11-10 04:50:46
46.170.92.188 attackspam
Unauthorized connection attempt from IP address 46.170.92.188 on Port 445(SMB)
2019-11-10 04:54:39
121.204.150.59 attackbots
web-1 [ssh] SSH Attack
2019-11-10 04:53:28
58.214.9.174 attackspambots
Automatic report - Banned IP Access
2019-11-10 05:05:35
192.99.128.239 attack
Nov  9 16:42:51 venus sshd\[8472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.128.239  user=root
Nov  9 16:42:53 venus sshd\[8472\]: Failed password for root from 192.99.128.239 port 46366 ssh2
Nov  9 16:46:57 venus sshd\[8517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.128.239  user=root
...
2019-11-10 05:08:28
164.132.44.25 attack
web-1 [ssh] SSH Attack
2019-11-10 05:16:07
200.39.236.176 attackbotsspam
Automatic report - Port Scan Attack
2019-11-10 05:21:24
49.88.112.113 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Failed password for root from 49.88.112.113 port 51085 ssh2
Failed password for root from 49.88.112.113 port 51085 ssh2
Failed password for root from 49.88.112.113 port 51085 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-11-10 04:58:16
200.150.177.9 attackbots
$f2bV_matches
2019-11-10 04:54:55
118.150.201.142 attackspam
Unauthorized connection attempt from IP address 118.150.201.142 on Port 445(SMB)
2019-11-10 04:56:15
2a03:b0c0:3:e0::2ae:a001 attackbotsspam
xmlrpc attack
2019-11-10 05:18:00

Recently Reported IPs

137.226.139.115 137.226.139.253 137.226.140.109 137.226.140.241
137.226.140.198 137.226.141.68 137.226.141.138 5.167.71.231
137.226.144.13 137.226.145.124 137.226.147.31 137.226.150.60
137.226.151.215 137.226.151.234 137.226.152.28 137.226.152.5
137.226.153.1 137.226.152.82 137.226.151.91 137.226.151.116