Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.196.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45956
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.196.133.		IN	A

;; AUTHORITY SECTION:
.			158	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 18:08:35 CST 2022
;; MSG SIZE  rcvd: 108
Host info
133.196.226.137.in-addr.arpa domain name pointer im12.ient.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.196.226.137.in-addr.arpa	name = im12.ient.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.81.90.31 attack
Autoban   63.81.90.31 AUTH/CONNECT
2019-12-13 00:46:13
63.83.73.206 attack
Autoban   63.83.73.206 AUTH/CONNECT
2019-12-13 00:26:12
63.81.87.91 attackspambots
Autoban   63.81.87.91 AUTH/CONNECT
2019-12-13 00:54:38
63.83.73.216 attackbotsspam
Autoban   63.83.73.216 AUTH/CONNECT
2019-12-13 00:20:21
51.79.87.90 attackspambots
Unauthorized SSH login attempts
2019-12-13 00:50:56
104.254.92.22 attackbotsspam
(From toni.milerum@gmail.com) Do you want to promote your business on tons of online ad sites monthly? One tiny investment every month will get you virtually endless traffic to your site forever!To find out more check out our site here: http://www.submitmyadnow.tech
2019-12-13 01:00:20
63.81.87.83 attack
Autoban   63.81.87.83 AUTH/CONNECT
2019-12-13 00:58:37
63.81.90.9 attack
Autoban   63.81.90.9 AUTH/CONNECT
2019-12-13 00:41:16
118.169.88.15 attackspam
23/tcp
[2019-12-12]1pkt
2019-12-13 00:59:58
172.104.116.36 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-13 00:42:24
222.186.175.183 attack
Dec 12 17:15:10 MK-Soft-VM7 sshd[23648]: Failed password for root from 222.186.175.183 port 12662 ssh2
Dec 12 17:15:14 MK-Soft-VM7 sshd[23648]: Failed password for root from 222.186.175.183 port 12662 ssh2
...
2019-12-13 00:22:46
113.161.4.40 attackbots
Unauthorized connection attempt detected from IP address 113.161.4.40 to port 445
2019-12-13 00:32:20
63.81.87.99 attackspambots
Autoban   63.81.87.99 AUTH/CONNECT
2019-12-13 00:52:17
103.224.251.102 attackbots
Dec 12 17:07:06 mail sshd[17469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.251.102 
Dec 12 17:07:08 mail sshd[17469]: Failed password for invalid user eeeeeeee from 103.224.251.102 port 38240 ssh2
Dec 12 17:13:11 mail sshd[18550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.251.102
2019-12-13 01:01:58
63.83.73.218 attackspam
Autoban   63.83.73.218 AUTH/CONNECT
2019-12-13 00:17:57

Recently Reported IPs

180.76.152.99 169.229.123.254 137.226.172.169 169.229.181.247
169.229.179.203 180.76.34.171 123.125.71.134 131.161.8.124
137.226.255.177 5.23.101.72 169.229.139.40 169.229.96.240
137.226.187.204 169.229.176.134 112.47.17.22 94.102.57.105
169.229.191.64 169.229.59.35 169.229.126.22 180.76.43.16