Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.190.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.190.19.			IN	A

;; AUTHORITY SECTION:
.			442	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 04:37:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
19.190.226.137.in-addr.arpa domain name pointer fraenkel.informatik.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.190.226.137.in-addr.arpa	name = fraenkel.informatik.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.155.173.51 attackspam
Unauthorized connection attempt detected from IP address 219.155.173.51 to port 23 [J]
2020-03-02 20:18:46
111.207.147.92 attackspam
Unauthorized connection attempt detected from IP address 111.207.147.92 to port 1433 [J]
2020-03-02 20:36:12
121.10.5.190 attackspambots
Unauthorized connection attempt detected from IP address 121.10.5.190 to port 23 [J]
2020-03-02 20:33:12
150.109.164.133 attackspam
Unauthorized connection attempt detected from IP address 150.109.164.133 to port 6432 [J]
2020-03-02 20:29:47
187.145.126.108 attackspambots
Unauthorized connection attempt detected from IP address 187.145.126.108 to port 8080 [J]
2020-03-02 20:23:38
37.54.209.249 attackbots
Unauthorized connection attempt detected from IP address 37.54.209.249 to port 23 [J]
2020-03-02 20:42:40
31.168.59.113 attackspam
Unauthorized connection attempt detected from IP address 31.168.59.113 to port 23 [J]
2020-03-02 20:13:38
139.59.80.65 attack
$f2bV_matches
2020-03-02 20:30:21
104.248.232.234 attackspam
Unauthorized connection attempt detected from IP address 104.248.232.234 to port 23 [J]
2020-03-02 20:37:18
170.106.81.117 attackbotsspam
Unauthorized connection attempt detected from IP address 170.106.81.117 to port 8020 [J]
2020-03-02 20:26:53
88.248.29.116 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-02 20:40:12
187.11.195.69 attack
Unauthorized connection attempt detected from IP address 187.11.195.69 to port 23 [J]
2020-03-02 20:23:59
2.237.19.162 attackspambots
Unauthorized connection attempt detected from IP address 2.237.19.162 to port 23 [J]
2020-03-02 20:44:25
77.92.233.150 attackspambots
20/3/2@03:54:33: FAIL: Alarm-Network address from=77.92.233.150
20/3/2@03:54:33: FAIL: Alarm-Network address from=77.92.233.150
...
2020-03-02 20:07:49
103.70.167.213 attack
Unauthorized connection attempt detected from IP address 103.70.167.213 to port 1433 [J]
2020-03-02 20:38:01

Recently Reported IPs

137.226.230.31 169.229.190.172 118.4.3.110 169.229.230.58
180.76.148.18 220.134.123.248 180.76.185.230 180.76.144.35
180.76.172.36 180.76.139.123 180.76.145.244 180.76.167.58
180.76.167.36 180.76.151.0 180.76.113.169 180.76.95.32
180.76.185.64 180.76.61.149 180.76.171.153 180.76.171.177