Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.14.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.14.1.			IN	A

;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 255 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 11:37:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
1.14.226.137.in-addr.arpa domain name pointer mauer.b19.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.14.226.137.in-addr.arpa	name = mauer.b19.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.219.253.5 attack
Jul 20 05:50:52 debian-2gb-nbg1-2 kernel: \[17475593.732479\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=217.219.253.5 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=22152 DF PROTO=TCP SPT=38723 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0
2020-07-20 18:44:12
1.64.109.115 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-20 18:51:48
101.36.178.48 attackbotsspam
Lines containing failures of 101.36.178.48
Jul 20 05:24:58 nbi-636 sshd[28492]: Invalid user hung from 101.36.178.48 port 42893
Jul 20 05:24:58 nbi-636 sshd[28492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.178.48 
Jul 20 05:25:00 nbi-636 sshd[28492]: Failed password for invalid user hung from 101.36.178.48 port 42893 ssh2
Jul 20 05:25:02 nbi-636 sshd[28492]: Received disconnect from 101.36.178.48 port 42893:11: Bye Bye [preauth]
Jul 20 05:25:02 nbi-636 sshd[28492]: Disconnected from invalid user hung 101.36.178.48 port 42893 [preauth]
Jul 20 05:28:51 nbi-636 sshd[29221]: User nagios from 101.36.178.48 not allowed because not listed in AllowUsers
Jul 20 05:28:52 nbi-636 sshd[29221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.178.48  user=nagios
Jul 20 05:28:54 nbi-636 sshd[29221]: Failed password for invalid user nagios from 101.36.178.48 port 30164 ssh2


........
-----------------------------------------
2020-07-20 18:29:12
157.245.240.102 attack
157.245.240.102 - - [20/Jul/2020:10:29:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.240.102 - - [20/Jul/2020:10:29:22 +0100] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.240.102 - - [20/Jul/2020:10:29:22 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-20 18:17:55
222.186.15.115 attack
Jul 20 12:18:41 abendstille sshd\[5667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Jul 20 12:18:43 abendstille sshd\[5667\]: Failed password for root from 222.186.15.115 port 64029 ssh2
Jul 20 12:18:49 abendstille sshd\[5770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
Jul 20 12:18:51 abendstille sshd\[5770\]: Failed password for root from 222.186.15.115 port 25587 ssh2
Jul 20 12:18:57 abendstille sshd\[5995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115  user=root
...
2020-07-20 18:20:37
218.92.0.138 attackspam
Jul 20 12:32:24 * sshd[28785]: Failed password for root from 218.92.0.138 port 47267 ssh2
Jul 20 12:32:37 * sshd[28785]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 47267 ssh2 [preauth]
2020-07-20 18:39:07
14.189.253.130 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-20 18:29:35
42.236.10.89 attack
Automated report (2020-07-20T17:50:56+08:00). Scraper detected at this address.
2020-07-20 18:51:23
211.24.73.223 attackspambots
Jul 20 07:26:11 piServer sshd[6372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.73.223 
Jul 20 07:26:13 piServer sshd[6372]: Failed password for invalid user gts from 211.24.73.223 port 43002 ssh2
Jul 20 07:31:21 piServer sshd[6916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.73.223 
...
2020-07-20 18:51:02
193.122.167.164 attackspambots
2020-07-20T09:38:42.408388randservbullet-proofcloud-66.localdomain sshd[10795]: Invalid user wang from 193.122.167.164 port 38000
2020-07-20T09:38:42.412821randservbullet-proofcloud-66.localdomain sshd[10795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.167.164
2020-07-20T09:38:42.408388randservbullet-proofcloud-66.localdomain sshd[10795]: Invalid user wang from 193.122.167.164 port 38000
2020-07-20T09:38:44.370678randservbullet-proofcloud-66.localdomain sshd[10795]: Failed password for invalid user wang from 193.122.167.164 port 38000 ssh2
...
2020-07-20 18:28:44
184.168.46.207 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-20 18:36:46
213.159.215.68 attackspam
20 attempts against mh-misbehave-ban on beach
2020-07-20 18:11:54
41.144.147.247 attackbots
Jul 20 12:03:01 mout sshd[29993]: Invalid user libuuid from 41.144.147.247 port 44817
2020-07-20 18:34:21
203.159.252.200 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-20 18:48:41
71.150.147.71 attack
<6 unauthorized SSH connections
2020-07-20 18:18:31

Recently Reported IPs

43.155.92.209 220.95.94.151 137.226.13.150 137.226.14.6
137.226.12.148 137.226.16.2 107.182.128.177 119.202.224.16
43.132.157.120 137.226.15.231 137.226.15.236 137.226.15.162
137.226.15.218 137.226.15.249 137.226.15.189 137.226.15.191
137.226.15.226 137.226.15.153 137.226.15.146 43.155.115.79