Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.149.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.149.118.		IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 06:03:46 CST 2022
;; MSG SIZE  rcvd: 108
Host info
118.149.226.137.in-addr.arpa domain name pointer 149-118.oih.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
118.149.226.137.in-addr.arpa	name = 149-118.oih.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.178.51.36 attackbots
Apr 13 05:52:08 host01 sshd[28953]: Failed password for root from 51.178.51.36 port 49758 ssh2
Apr 13 05:55:55 host01 sshd[29756]: Failed password for root from 51.178.51.36 port 57968 ssh2
...
2020-04-13 12:26:08
14.99.36.108 attackspam
detected by Fail2Ban
2020-04-13 12:44:08
218.92.0.175 attackspam
Apr 13 07:00:58 ift sshd\[57364\]: Failed password for root from 218.92.0.175 port 27394 ssh2Apr 13 07:01:01 ift sshd\[57364\]: Failed password for root from 218.92.0.175 port 27394 ssh2Apr 13 07:01:05 ift sshd\[57364\]: Failed password for root from 218.92.0.175 port 27394 ssh2Apr 13 07:01:18 ift sshd\[57370\]: Failed password for root from 218.92.0.175 port 55700 ssh2Apr 13 07:01:41 ift sshd\[57382\]: Failed password for root from 218.92.0.175 port 27508 ssh2
...
2020-04-13 12:05:45
120.53.11.11 attackspambots
Apr 13 07:14:42 pkdns2 sshd\[14497\]: Invalid user user02 from 120.53.11.11Apr 13 07:14:45 pkdns2 sshd\[14497\]: Failed password for invalid user user02 from 120.53.11.11 port 41802 ssh2Apr 13 07:16:03 pkdns2 sshd\[14603\]: Invalid user test from 120.53.11.11Apr 13 07:16:04 pkdns2 sshd\[14603\]: Failed password for invalid user test from 120.53.11.11 port 55778 ssh2Apr 13 07:17:25 pkdns2 sshd\[14671\]: Failed password for root from 120.53.11.11 port 41522 ssh2Apr 13 07:18:51 pkdns2 sshd\[14711\]: Invalid user hadoop from 120.53.11.11
...
2020-04-13 12:34:54
118.69.35.18 attackbotsspam
1586750396 - 04/13/2020 05:59:56 Host: 118.69.35.18/118.69.35.18 Port: 445 TCP Blocked
2020-04-13 12:08:41
119.93.163.220 attackspam
Apr 12 18:07:48 hpm sshd\[3582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.163.220  user=root
Apr 12 18:07:50 hpm sshd\[3582\]: Failed password for root from 119.93.163.220 port 44947 ssh2
Apr 12 18:11:40 hpm sshd\[3849\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.163.220  user=root
Apr 12 18:11:42 hpm sshd\[3849\]: Failed password for root from 119.93.163.220 port 59052 ssh2
Apr 12 18:15:28 hpm sshd\[4125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.93.163.220  user=root
2020-04-13 12:25:10
203.56.4.47 attack
Apr 13 03:59:22 work-partkepr sshd\[22147\]: Invalid user j from 203.56.4.47 port 59396
Apr 13 03:59:22 work-partkepr sshd\[22147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.56.4.47
...
2020-04-13 12:37:34
98.204.69.141 attackbotsspam
Fail2Ban Ban Triggered
2020-04-13 12:33:24
192.34.57.113 attack
Apr 13 06:14:28 host01 sshd[1425]: Failed password for root from 192.34.57.113 port 43660 ssh2
Apr 13 06:17:54 host01 sshd[2282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.34.57.113 
Apr 13 06:17:56 host01 sshd[2282]: Failed password for invalid user zangrando from 192.34.57.113 port 51858 ssh2
...
2020-04-13 12:31:06
129.211.67.139 attackbots
frenzy
2020-04-13 12:40:36
164.77.52.227 attack
Apr 13 06:50:41 lukav-desktop sshd\[23616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.52.227  user=root
Apr 13 06:50:44 lukav-desktop sshd\[23616\]: Failed password for root from 164.77.52.227 port 40508 ssh2
Apr 13 06:55:00 lukav-desktop sshd\[23803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.52.227  user=root
Apr 13 06:55:02 lukav-desktop sshd\[23803\]: Failed password for root from 164.77.52.227 port 44994 ssh2
Apr 13 06:59:27 lukav-desktop sshd\[24006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.52.227  user=mysql
2020-04-13 12:29:45
191.252.222.148 attackbotsspam
Lines containing failures of 191.252.222.148
Apr 13 06:03:22 shared11 sshd[28344]: Invalid user kaare from 191.252.222.148 port 54948
Apr 13 06:03:22 shared11 sshd[28344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.222.148
Apr 13 06:03:24 shared11 sshd[28344]: Failed password for invalid user kaare from 191.252.222.148 port 54948 ssh2
Apr 13 06:03:24 shared11 sshd[28344]: Received disconnect from 191.252.222.148 port 54948:11: Bye Bye [preauth]
Apr 13 06:03:24 shared11 sshd[28344]: Disconnected from invalid user kaare 191.252.222.148 port 54948 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.252.222.148
2020-04-13 12:27:38
120.70.100.54 attackspambots
Apr 13 05:56:07 lock-38 sshd[933361]: Invalid user ts from 120.70.100.54 port 42048
Apr 13 05:56:07 lock-38 sshd[933361]: Failed password for invalid user ts from 120.70.100.54 port 42048 ssh2
Apr 13 05:59:25 lock-38 sshd[933429]: Invalid user dearden from 120.70.100.54 port 33335
Apr 13 05:59:25 lock-38 sshd[933429]: Invalid user dearden from 120.70.100.54 port 33335
Apr 13 05:59:25 lock-38 sshd[933429]: Failed password for invalid user dearden from 120.70.100.54 port 33335 ssh2
...
2020-04-13 12:32:59
49.88.112.66 attackbotsspam
Apr 13 03:52:06 game-panel sshd[15560]: Failed password for root from 49.88.112.66 port 17825 ssh2
Apr 13 03:52:08 game-panel sshd[15560]: Failed password for root from 49.88.112.66 port 17825 ssh2
Apr 13 03:52:11 game-panel sshd[15560]: Failed password for root from 49.88.112.66 port 17825 ssh2
2020-04-13 12:26:40
106.3.130.53 attackspam
2020-04-13T05:56:22.191878vps773228.ovh.net sshd[24800]: Invalid user gasiago from 106.3.130.53 port 47588
2020-04-13T05:56:22.206238vps773228.ovh.net sshd[24800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.130.53
2020-04-13T05:56:22.191878vps773228.ovh.net sshd[24800]: Invalid user gasiago from 106.3.130.53 port 47588
2020-04-13T05:56:24.291124vps773228.ovh.net sshd[24800]: Failed password for invalid user gasiago from 106.3.130.53 port 47588 ssh2
2020-04-13T05:59:30.701781vps773228.ovh.net sshd[25931]: Invalid user test from 106.3.130.53 port 40336
...
2020-04-13 12:30:07

Recently Reported IPs

169.229.122.104 137.226.99.171 137.226.123.53 137.226.147.180
137.226.159.72 137.226.140.135 189.147.145.200 169.229.112.37
169.229.127.44 137.226.140.99 162.240.31.221 137.226.96.182
169.229.122.54 137.226.151.218 169.229.126.37 137.226.121.179
169.229.125.82 94.102.48.222 94.102.48.41 169.229.124.133