Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.18.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.18.7.			IN	A

;; AUTHORITY SECTION:
.			443	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 12:29:12 CST 2022
;; MSG SIZE  rcvd: 105
Host info
7.18.226.137.in-addr.arpa domain name pointer sw23-04.mgmt.ecs-nrw.fds.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
7.18.226.137.in-addr.arpa	name = sw23-04.mgmt.ecs-nrw.fds.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.228.66.116 attackbotsspam
Automatic report - Port Scan Attack
2020-02-15 19:49:56
64.39.102.150 attackspam
44 attempts against mh-misbehave-ban on pine
2020-02-15 20:28:48
95.38.219.204 attackspambots
Unauthorized connection attempt from IP address 95.38.219.204 on Port 445(SMB)
2020-02-15 20:21:21
125.231.222.149 attackbots
Unauthorized connection attempt from IP address 125.231.222.149 on Port 445(SMB)
2020-02-15 20:20:34
202.123.176.251 attack
Unauthorized connection attempt from IP address 202.123.176.251 on Port 445(SMB)
2020-02-15 19:54:47
91.166.70.196 attack
1581742080 - 02/15/2020 05:48:00 Host: 91.166.70.196/91.166.70.196 Port: 445 TCP Blocked
2020-02-15 19:48:59
108.29.210.86 attack
DATE:2020-02-15 05:46:16, IP:108.29.210.86, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-15 20:02:16
103.82.158.44 attack
Automatic report - Port Scan Attack
2020-02-15 20:03:33
190.24.138.66 attack
unauthorized connection attempt
2020-02-15 19:47:22
46.16.91.49 attackspambots
".well-known/acme-challenge/O62D3C6P6RQSRT4LTLO2Z-XVBAX_-QI2"_
2020-02-15 19:53:55
117.63.169.57 attack
Feb 15 07:06:38 mout sshd[31768]: Connection closed by 117.63.169.57 port 58300 [preauth]
Feb 15 07:10:24 mout sshd[32006]: Connection closed by 117.63.169.57 port 44150 [preauth]
Feb 15 07:13:30 mout sshd[32186]: Connection closed by 117.63.169.57 port 58214 [preauth]
2020-02-15 20:04:54
117.144.189.69 attack
Jan  4 12:53:38 ms-srv sshd[36293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.144.189.69
Jan  4 12:53:40 ms-srv sshd[36293]: Failed password for invalid user odk from 117.144.189.69 port 48498 ssh2
2020-02-15 20:20:56
207.154.213.152 attack
(sshd) Failed SSH login from 207.154.213.152 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 15 10:17:44 ubnt-55d23 sshd[15850]: Invalid user ts3bot from 207.154.213.152 port 43922
Feb 15 10:17:46 ubnt-55d23 sshd[15850]: Failed password for invalid user ts3bot from 207.154.213.152 port 43922 ssh2
2020-02-15 19:58:20
49.234.124.225 attackspam
Feb 15 08:34:12 intra sshd\[31715\]: Invalid user valeska from 49.234.124.225Feb 15 08:34:14 intra sshd\[31715\]: Failed password for invalid user valeska from 49.234.124.225 port 48784 ssh2Feb 15 08:36:44 intra sshd\[31732\]: Invalid user cactiuser from 49.234.124.225Feb 15 08:36:47 intra sshd\[31732\]: Failed password for invalid user cactiuser from 49.234.124.225 port 35648 ssh2Feb 15 08:39:18 intra sshd\[31789\]: Invalid user antonio from 49.234.124.225Feb 15 08:39:20 intra sshd\[31789\]: Failed password for invalid user antonio from 49.234.124.225 port 50748 ssh2
...
2020-02-15 20:03:50
13.234.138.142 attackspam
Feb 15 13:22:26 srv206 sshd[3092]: Invalid user mikeg from 13.234.138.142
Feb 15 13:22:26 srv206 sshd[3092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-13-234-138-142.ap-south-1.compute.amazonaws.com
Feb 15 13:22:26 srv206 sshd[3092]: Invalid user mikeg from 13.234.138.142
Feb 15 13:22:29 srv206 sshd[3092]: Failed password for invalid user mikeg from 13.234.138.142 port 39066 ssh2
...
2020-02-15 20:26:26

Recently Reported IPs

137.226.18.197 49.77.229.159 137.226.18.223 202.95.12.24
49.244.159.228 168.63.152.179 49.249.27.90 137.226.18.139
137.226.18.142 137.226.18.145 192.241.221.5 137.226.18.148
137.226.18.150 137.226.18.157 50.213.14.145 198.235.24.11
137.226.18.165 192.241.220.79 137.226.18.175 137.226.1.85