Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.149.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.149.164.		IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 05:41:57 CST 2022
;; MSG SIZE  rcvd: 108
Host info
164.149.226.137.in-addr.arpa domain name pointer 149-164.oih.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.149.226.137.in-addr.arpa	name = 149-164.oih.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
67.205.138.198 attackbots
Apr 21 20:37:11 pve1 sshd[14997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 
Apr 21 20:37:12 pve1 sshd[14997]: Failed password for invalid user qk from 67.205.138.198 port 47272 ssh2
...
2020-04-22 02:52:32
64.202.185.161 attack
IP blocked
2020-04-22 02:53:41
69.229.6.34 attack
Invalid user test from 69.229.6.34 port 50782
2020-04-22 02:50:48
51.89.164.153 attack
SSH login attempts.
2020-04-22 02:57:37
213.32.111.53 attackspambots
Apr 21 04:32:00 web1 sshd\[8867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.111.53  user=root
Apr 21 04:32:01 web1 sshd\[8867\]: Failed password for root from 213.32.111.53 port 53604 ssh2
Apr 21 04:35:52 web1 sshd\[9238\]: Invalid user kq from 213.32.111.53
Apr 21 04:35:52 web1 sshd\[9238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.111.53
Apr 21 04:35:54 web1 sshd\[9238\]: Failed password for invalid user kq from 213.32.111.53 port 46092 ssh2
2020-04-22 03:14:19
201.90.101.165 attack
Apr 21 15:01:38 *** sshd[6822]: Invalid user admin from 201.90.101.165
2020-04-22 03:18:11
202.79.168.240 attackbots
Invalid user um from 202.79.168.240 port 34034
2020-04-22 03:17:55
14.234.103.126 attackspam
Invalid user admin from 14.234.103.126 port 39999
2020-04-22 03:07:50
49.234.52.176 attack
Invalid user firefart from 49.234.52.176 port 56138
2020-04-22 02:59:09
14.140.95.157 attackbots
SSH brutforce
2020-04-22 03:08:58
90.176.150.123 attack
2020-04-21T13:44:42.0661371495-001 sshd[42680]: Invalid user bj from 90.176.150.123 port 45721
2020-04-21T13:44:44.4923391495-001 sshd[42680]: Failed password for invalid user bj from 90.176.150.123 port 45721 ssh2
2020-04-21T13:48:08.6172341495-001 sshd[42857]: Invalid user admin from 90.176.150.123 port 47300
2020-04-21T13:48:08.6203921495-001 sshd[42857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.150.broadband9.iol.cz
2020-04-21T13:48:08.6172341495-001 sshd[42857]: Invalid user admin from 90.176.150.123 port 47300
2020-04-21T13:48:09.9828951495-001 sshd[42857]: Failed password for invalid user admin from 90.176.150.123 port 47300 ssh2
...
2020-04-22 02:47:56
51.255.215.177 attackbots
Apr 21 18:34:04 sso sshd[19778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.215.177
Apr 21 18:34:07 sso sshd[19778]: Failed password for invalid user admin from 51.255.215.177 port 42628 ssh2
...
2020-04-22 02:56:22
92.63.96.234 attackbotsspam
Invalid user ud from 92.63.96.234 port 50928
2020-04-22 02:47:37
35.234.62.37 attackspambots
Invalid user admin from 35.234.62.37 port 44438
2020-04-22 03:06:41
206.253.53.211 attack
Invalid user admin from 206.253.53.211 port 36723
2020-04-22 03:15:34

Recently Reported IPs

137.226.103.54 137.226.141.50 137.226.147.25 137.226.78.172
137.226.216.140 137.226.181.87 137.226.79.45 137.226.186.46
137.226.187.131 180.76.113.143 137.226.108.22 137.226.136.61
137.226.142.35 137.226.206.181 137.226.169.184 137.226.139.88
137.226.185.38 137.226.162.170 138.219.216.142 137.226.29.39