Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.139.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.139.34.			IN	A

;; AUTHORITY SECTION:
.			181	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 09:40:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
34.139.226.137.in-addr.arpa domain name pointer n7k-sw23-1-wohnheime-et1-13.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.139.226.137.in-addr.arpa	name = n7k-sw23-1-wohnheime-et1-13.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.104.124.204 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:44.
2019-09-23 09:15:19
182.61.166.179 attackbots
Sep 22 21:00:25 ny01 sshd[23511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179
Sep 22 21:00:27 ny01 sshd[23511]: Failed password for invalid user vj from 182.61.166.179 port 54848 ssh2
Sep 22 21:04:36 ny01 sshd[24247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179
2019-09-23 09:06:46
58.39.16.4 attackspam
Sep 23 06:50:16 intra sshd\[17917\]: Invalid user xxxxxx from 58.39.16.4Sep 23 06:50:18 intra sshd\[17917\]: Failed password for invalid user xxxxxx from 58.39.16.4 port 42882 ssh2Sep 23 06:54:40 intra sshd\[17990\]: Invalid user 12345678 from 58.39.16.4Sep 23 06:54:42 intra sshd\[17990\]: Failed password for invalid user 12345678 from 58.39.16.4 port 35429 ssh2Sep 23 06:59:02 intra sshd\[18070\]: Invalid user kg123 from 58.39.16.4Sep 23 06:59:04 intra sshd\[18070\]: Failed password for invalid user kg123 from 58.39.16.4 port 56189 ssh2
...
2019-09-23 12:00:34
42.112.91.102 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:52.
2019-09-23 09:05:31
153.122.75.216 attackbotsspam
WordPress wp-login brute force :: 153.122.75.216 0.048 BYPASS [23/Sep/2019:07:00:41  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-23 09:27:45
77.247.110.213 attackspambots
1 pkts, ports: UDP:5060
2019-09-23 09:16:17
36.90.16.218 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:50.
2019-09-23 09:07:39
165.227.18.169 attackbotsspam
Sep 23 00:52:50 ws12vmsma01 sshd[1257]: Invalid user sm from 165.227.18.169
Sep 23 00:52:52 ws12vmsma01 sshd[1257]: Failed password for invalid user sm from 165.227.18.169 port 34212 ssh2
Sep 23 00:58:51 ws12vmsma01 sshd[2060]: Invalid user roland from 165.227.18.169
...
2019-09-23 12:02:58
190.40.155.40 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:47.
2019-09-23 09:11:16
106.12.177.51 attackbots
2019-09-22T21:31:20.989222abusebot-8.cloudsearch.cf sshd\[10132\]: Invalid user raju from 106.12.177.51 port 54144
2019-09-23 09:05:05
180.126.218.98 attackbotsspam
firewall-block, port(s): 22/tcp
2019-09-23 09:22:37
217.133.58.148 attackbots
Sep 22 22:18:09 XXX sshd[48947]: Invalid user mona from 217.133.58.148 port 49577
2019-09-23 09:21:25
178.33.12.237 attackspam
Sep 23 01:38:18 lnxmysql61 sshd[28903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237
2019-09-23 09:27:31
191.232.191.238 attackbots
Sep 22 20:47:48 TORMINT sshd\[3584\]: Invalid user libsys from 191.232.191.238
Sep 22 20:47:48 TORMINT sshd\[3584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.191.238
Sep 22 20:47:49 TORMINT sshd\[3584\]: Failed password for invalid user libsys from 191.232.191.238 port 41392 ssh2
...
2019-09-23 09:02:33
118.24.5.135 attackspam
Sep 22 20:35:19 XXX sshd[18405]: Invalid user sloane from 118.24.5.135 port 60360
2019-09-23 09:29:14

Recently Reported IPs

137.226.138.198 137.226.139.126 137.226.139.152 137.226.140.17
137.226.140.164 137.226.140.253 137.226.8.21 137.226.7.91
169.229.242.91 169.229.2.254 36.57.65.84 137.226.12.42
37.140.247.162 39.103.232.57 184.178.172.3 180.76.106.188
81.91.158.50 137.226.8.214 20.58.181.10 137.226.188.233