Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.150.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.150.169.		IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 12:21:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 169.150.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.150.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.168 attackbotsspam
Sep 21 07:04:44 s2 sshd[31045]: Failed password for root from 61.177.172.168 port 14335 ssh2
Sep 21 07:04:50 s2 sshd[31045]: Failed password for root from 61.177.172.168 port 14335 ssh2
Sep 21 07:04:54 s2 sshd[31045]: Failed password for root from 61.177.172.168 port 14335 ssh2
Sep 21 07:04:58 s2 sshd[31045]: Failed password for root from 61.177.172.168 port 14335 ssh2
2020-09-21 13:12:20
212.64.66.135 attackbotsspam
2020-09-20T22:46:32.475013snf-827550 sshd[26300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.66.135
2020-09-20T22:46:32.460808snf-827550 sshd[26300]: Invalid user prueba1 from 212.64.66.135 port 37392
2020-09-20T22:46:34.470531snf-827550 sshd[26300]: Failed password for invalid user prueba1 from 212.64.66.135 port 37392 ssh2
...
2020-09-21 13:14:29
198.245.53.163 attackspambots
Failed password for invalid user user from 198.245.53.163 port 49276 ssh2
2020-09-21 13:51:18
122.51.67.249 attack
Invalid user shoutcast from 122.51.67.249 port 38260
2020-09-21 13:47:24
91.93.58.177 attackspam
Unauthorized connection attempt from IP address 91.93.58.177 on Port 445(SMB)
2020-09-21 13:47:56
167.114.185.237 attackbotsspam
Sep 21 02:37:42 scw-6657dc sshd[22970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237  user=root
Sep 21 02:37:42 scw-6657dc sshd[22970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.185.237  user=root
Sep 21 02:37:44 scw-6657dc sshd[22970]: Failed password for root from 167.114.185.237 port 44582 ssh2
...
2020-09-21 13:37:29
117.247.95.246 attackspambots
Unauthorised access (Sep 20) SRC=117.247.95.246 LEN=48 TTL=110 ID=23735 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-21 13:13:35
140.120.15.176 attackspam
Sep 21 02:28:46 our-server-hostname sshd[11960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.120.15.176  user=r.r
Sep 21 02:28:48 our-server-hostname sshd[11960]: Failed password for r.r from 140.120.15.176 port 48384 ssh2
Sep 21 02:45:30 our-server-hostname sshd[14328]: Invalid user ftpuser from 140.120.15.176
Sep 21 02:45:30 our-server-hostname sshd[14328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.120.15.176 
Sep 21 02:45:32 our-server-hostname sshd[14328]: Failed password for invalid user ftpuser from 140.120.15.176 port 35942 ssh2
Sep 21 02:49:29 our-server-hostname sshd[14820]: Invalid user admin from 140.120.15.176
Sep 21 02:49:29 our-server-hostname sshd[14820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.120.15.176 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=140.120.15.176
2020-09-21 13:28:04
168.187.75.4 attackbotsspam
Multiple SSH authentication failures from 168.187.75.4
2020-09-21 13:14:58
190.145.254.138 attack
Sep 21 11:16:02 itv-usvr-01 sshd[1130]: Invalid user arkserver from 190.145.254.138
Sep 21 11:16:02 itv-usvr-01 sshd[1130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.254.138
Sep 21 11:16:02 itv-usvr-01 sshd[1130]: Invalid user arkserver from 190.145.254.138
Sep 21 11:16:04 itv-usvr-01 sshd[1130]: Failed password for invalid user arkserver from 190.145.254.138 port 22252 ssh2
Sep 21 11:22:27 itv-usvr-01 sshd[1402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.254.138  user=root
Sep 21 11:22:29 itv-usvr-01 sshd[1402]: Failed password for root from 190.145.254.138 port 15654 ssh2
2020-09-21 13:20:23
206.189.199.48 attack
Sep 21 05:24:52 IngegnereFirenze sshd[18509]: User root from 206.189.199.48 not allowed because not listed in AllowUsers
...
2020-09-21 13:26:25
45.95.168.152 attack
Remote recon
2020-09-21 13:36:48
182.114.202.46 attackspambots
Tried our host z.
2020-09-21 13:45:00
218.92.0.158 attackbotsspam
Sep 21 12:23:17 itv-usvr-02 sshd[15756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Sep 21 12:23:19 itv-usvr-02 sshd[15756]: Failed password for root from 218.92.0.158 port 39765 ssh2
Sep 21 12:23:23 itv-usvr-02 sshd[15756]: Failed password for root from 218.92.0.158 port 39765 ssh2
Sep 21 12:23:17 itv-usvr-02 sshd[15756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Sep 21 12:23:19 itv-usvr-02 sshd[15756]: Failed password for root from 218.92.0.158 port 39765 ssh2
Sep 21 12:23:23 itv-usvr-02 sshd[15756]: Failed password for root from 218.92.0.158 port 39765 ssh2
2020-09-21 13:25:52
83.170.242.46 attack
Unauthorized connection attempt from IP address 83.170.242.46 on Port 445(SMB)
2020-09-21 13:49:04

Recently Reported IPs

93.177.116.64 137.226.107.203 137.226.69.62 137.226.205.62
151.93.146.217 180.76.249.250 150.109.114.220 169.229.33.37
169.229.52.24 169.229.52.47 169.229.29.221 169.229.30.164
169.229.6.201 137.226.90.98 137.226.181.71 175.204.163.2
169.229.108.233 169.229.108.187 5.167.68.169 173.14.62.137