Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.139.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.139.5.			IN	A

;; AUTHORITY SECTION:
.			591	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 03:50:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 5.139.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.139.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.220.140.204 attackbots
19/10/16@07:21:14: FAIL: Alarm-Intrusion address from=61.220.140.204
...
2019-10-16 22:32:11
134.73.76.76 attack
Postfix RBL failed
2019-10-16 22:31:42
46.199.233.130 attack
B: /wp-login.php attack
2019-10-16 22:29:43
74.208.252.136 attack
Oct 16 13:15:54 server sshd\[27238\]: Failed password for invalid user P@$$wort_1@3 from 74.208.252.136 port 34264 ssh2
Oct 16 14:17:06 server sshd\[13960\]: Invalid user toor1 from 74.208.252.136
Oct 16 14:17:06 server sshd\[13960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136 
Oct 16 14:17:08 server sshd\[13960\]: Failed password for invalid user toor1 from 74.208.252.136 port 36546 ssh2
Oct 16 14:21:09 server sshd\[15277\]: Invalid user arcades from 74.208.252.136
Oct 16 14:21:09 server sshd\[15277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136 
...
2019-10-16 22:36:14
181.170.160.58 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 22:04:44
13.77.142.89 attackspambots
Oct 16 14:01:13 vtv3 sshd\[24511\]: Invalid user public from 13.77.142.89 port 52492
Oct 16 14:01:13 vtv3 sshd\[24511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
Oct 16 14:01:15 vtv3 sshd\[24511\]: Failed password for invalid user public from 13.77.142.89 port 52492 ssh2
Oct 16 14:04:54 vtv3 sshd\[25998\]: Invalid user nnnnn from 13.77.142.89 port 45758
Oct 16 14:04:54 vtv3 sshd\[25998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
Oct 16 14:17:15 vtv3 sshd\[32467\]: Invalid user service1 from 13.77.142.89 port 56798
Oct 16 14:17:15 vtv3 sshd\[32467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89
Oct 16 14:17:17 vtv3 sshd\[32467\]: Failed password for invalid user service1 from 13.77.142.89 port 56798 ssh2
Oct 16 14:21:15 vtv3 sshd\[2209\]: Invalid user bmffr from 13.77.142.89 port 50718
Oct 16 14:21:15 vtv3 sshd\[2209\]: pam_unix
2019-10-16 22:32:35
159.65.239.48 attack
Oct 16 15:24:51 lnxweb62 sshd[12110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.239.48
2019-10-16 22:20:20
77.247.110.222 attackspam
[portscan] tcp/81 [alter-web/web-proxy]
[scan/connect: 2 time(s)]
in spfbl.net:'listed'
*(RWIN=1024)(10161238)
2019-10-16 22:08:03
89.47.160.175 attackspambots
$f2bV_matches
2019-10-16 22:33:22
36.111.36.83 attack
2019-10-16T08:00:29.830905ns525875 sshd\[17799\]: Invalid user utnet from 36.111.36.83 port 39004
2019-10-16T08:00:29.833110ns525875 sshd\[17799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.36.83
2019-10-16T08:00:31.828278ns525875 sshd\[17799\]: Failed password for invalid user utnet from 36.111.36.83 port 39004 ssh2
2019-10-16T08:05:42.674061ns525875 sshd\[24056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.36.83  user=root
...
2019-10-16 22:41:22
51.68.17.217 attack
Port scan on 2 port(s): 139 445
2019-10-16 22:21:48
189.172.79.33 attackbotsspam
Oct 16 04:01:46 php1 sshd\[10490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.172.79.33  user=root
Oct 16 04:01:48 php1 sshd\[10490\]: Failed password for root from 189.172.79.33 port 41874 ssh2
Oct 16 04:06:47 php1 sshd\[10922\]: Invalid user aland from 189.172.79.33
Oct 16 04:06:47 php1 sshd\[10922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.172.79.33
Oct 16 04:06:49 php1 sshd\[10922\]: Failed password for invalid user aland from 189.172.79.33 port 53774 ssh2
2019-10-16 22:11:50
222.186.175.216 attackbotsspam
2019-10-16T14:14:17.710367shield sshd\[27513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
2019-10-16T14:14:19.478510shield sshd\[27513\]: Failed password for root from 222.186.175.216 port 10270 ssh2
2019-10-16T14:14:23.365342shield sshd\[27513\]: Failed password for root from 222.186.175.216 port 10270 ssh2
2019-10-16T14:14:27.474277shield sshd\[27513\]: Failed password for root from 222.186.175.216 port 10270 ssh2
2019-10-16T14:14:31.472044shield sshd\[27513\]: Failed password for root from 222.186.175.216 port 10270 ssh2
2019-10-16 22:16:35
51.68.125.206 attackspambots
Oct 16 15:22:50 tux-35-217 sshd\[13443\]: Invalid user kali from 51.68.125.206 port 44618
Oct 16 15:22:50 tux-35-217 sshd\[13443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.125.206
Oct 16 15:22:52 tux-35-217 sshd\[13443\]: Failed password for invalid user kali from 51.68.125.206 port 44618 ssh2
Oct 16 15:23:45 tux-35-217 sshd\[13454\]: Invalid user kali from 51.68.125.206 port 59228
Oct 16 15:23:45 tux-35-217 sshd\[13454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.125.206
...
2019-10-16 22:22:36
222.186.175.217 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Failed password for root from 222.186.175.217 port 45570 ssh2
Failed password for root from 222.186.175.217 port 45570 ssh2
Failed password for root from 222.186.175.217 port 45570 ssh2
Failed password for root from 222.186.175.217 port 45570 ssh2
2019-10-16 22:17:22

Recently Reported IPs

137.226.139.40 137.226.139.93 137.226.139.160 75.31.20.240
137.226.117.26 137.226.119.118 137.226.81.73 137.226.10.48
137.226.105.77 169.229.97.118 137.226.125.182 137.226.128.63
137.226.128.184 137.226.128.221 137.226.129.8 137.226.129.91
137.226.129.133 137.226.129.170 137.226.129.248 137.226.130.99