Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.162.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.162.1.			IN	A

;; AUTHORITY SECTION:
.			556	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 165 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 11:57:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
1.162.226.137.in-addr.arpa domain name pointer c9400-tg64-1-vl713.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.162.226.137.in-addr.arpa	name = c9400-tg64-1-vl713.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
145.239.10.50 attack
WWW.XN--NETZFUNDSTCKDERWOCHE-YEC.DE 145.239.10.50 [30/Jun/2020:06:23:20 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4248 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
www.xn--netzfundstckderwoche-yec.de 145.239.10.50 [30/Jun/2020:06:23:20 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4248 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
2020-06-30 18:59:56
27.128.233.104 attackbotsspam
unauthorized connection attempt
2020-06-30 18:47:58
92.63.194.240 attackspam
Unauthorized connection attempt detected from IP address 92.63.194.240 to port 3390
2020-06-30 19:14:54
60.167.178.182 attack
Jun 30 10:56:59 piServer sshd[25149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.178.182 
Jun 30 10:57:01 piServer sshd[25149]: Failed password for invalid user indo from 60.167.178.182 port 37436 ssh2
Jun 30 11:03:17 piServer sshd[25653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.178.182 
...
2020-06-30 19:19:06
185.39.10.63 attackspam
[H1.VM1] Blocked by UFW
2020-06-30 19:16:14
60.190.63.70 attackbots
Unauthorized connection attempt detected from IP address 60.190.63.70 to port 1433
2020-06-30 18:54:10
116.255.190.144 attackspambots
Icarus honeypot on github
2020-06-30 19:16:50
122.51.91.191 attackspambots
SSH Brute Force
2020-06-30 18:45:41
111.229.15.228 attack
Unauthorized connection attempt detected from IP address 111.229.15.228 to port 2801
2020-06-30 19:14:39
213.59.135.87 attackbotsspam
$f2bV_matches
2020-06-30 19:06:40
45.234.216.43 attackspam
unauthorized connection attempt
2020-06-30 19:24:20
49.69.246.130 attackbotsspam
Automatic report - Port Scan Attack
2020-06-30 19:24:04
192.35.169.37 attack
 TCP (SYN) 192.35.169.37:55578 -> port 8041, len 44
2020-06-30 19:08:01
185.100.87.207 attackbots
joshuajohannes.de:80 185.100.87.207 - - [30/Jun/2020:12:33:04 +0200] "POST /xmlrpc.php HTTP/1.0" 301 501 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 OPR/55.0.2994.44"
joshuajohannes.de 185.100.87.207 [30/Jun/2020:12:33:05 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36 OPR/55.0.2994.44"
2020-06-30 19:25:37
106.54.251.179 attackspambots
2020-06-30T13:06:12+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-06-30 19:19:33

Recently Reported IPs

137.226.161.226 137.226.159.239 137.226.156.190 137.226.165.53
137.226.168.182 137.226.168.38 137.226.169.88 137.226.167.110
137.226.168.143 137.226.169.125 137.226.168.245 137.226.167.222
137.226.163.224 137.226.164.40 137.226.165.123 137.226.165.97
137.226.165.181 137.226.165.212 137.226.165.219 137.226.166.84