Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.14.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.14.2.			IN	A

;; AUTHORITY SECTION:
.			100	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:11:56 CST 2022
;; MSG SIZE  rcvd: 105
Host info
2.14.226.137.in-addr.arpa domain name pointer mauer1.b19.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.14.226.137.in-addr.arpa	name = mauer1.b19.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.186.197 attack
Invalid user client from 118.25.186.197 port 42350
2019-07-13 16:11:44
167.99.173.171 attackspambots
Invalid user testuser from 167.99.173.171 port 37486
2019-07-13 16:04:37
223.99.126.67 attack
Invalid user mongouser from 223.99.126.67 port 47194
2019-07-13 15:50:15
165.22.251.129 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-13 15:25:11
194.31.40.6 attackbots
Invalid user teamspeak2 from 194.31.40.6 port 57788
2019-07-13 15:56:14
190.119.190.122 attackspam
SSH Brute Force
2019-07-13 15:18:59
1.4.236.64 attackspam
Invalid user nagesh from 1.4.236.64 port 50488
2019-07-13 15:49:49
178.33.157.248 attackbotsspam
Invalid user admin from 178.33.157.248 port 46824
2019-07-13 16:03:03
172.245.56.247 attack
Invalid user loginuser from 172.245.56.247 port 60600
2019-07-13 15:24:18
78.195.178.119 attack
Invalid user pi from 78.195.178.119 port 36605
2019-07-13 15:42:03
86.126.175.60 attackspambots
Invalid user misp from 86.126.175.60 port 54028
2019-07-13 15:39:18
128.199.242.84 attackbots
Jul 13 09:22:20 62-210-73-4 sshd\[7305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.242.84  user=root
Jul 13 09:22:22 62-210-73-4 sshd\[7305\]: Failed password for root from 128.199.242.84 port 54617 ssh2
...
2019-07-13 15:31:20
66.70.188.25 attack
Jul 13 09:12:35 localhost sshd\[25934\]: Invalid user teamspeak1 from 66.70.188.25 port 34898
Jul 13 09:12:35 localhost sshd\[25934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.188.25
Jul 13 09:12:37 localhost sshd\[25934\]: Failed password for invalid user teamspeak1 from 66.70.188.25 port 34898 ssh2
2019-07-13 15:43:26
178.128.107.61 attack
Invalid user abu from 178.128.107.61 port 57343
2019-07-13 16:02:39
103.78.97.61 attackbotsspam
Invalid user admin from 103.78.97.61 port 58086
2019-07-13 15:37:04

Recently Reported IPs

137.226.13.72 169.229.70.58 180.76.40.176 137.226.13.151
169.229.149.65 180.76.40.129 180.76.35.82 169.229.219.146
180.76.40.68 123.125.71.136 169.229.70.84 180.76.35.1
169.229.70.53 169.229.11.236 180.76.232.15 137.226.167.18
180.76.58.144 137.226.11.101 169.229.32.172 169.229.126.23