Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.199.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.199.121.		IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062600 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 15:13:25 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 121.199.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.199.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.75.103.35 attackbotsspam
2019-10-22T12:17:03.157281abusebot-5.cloudsearch.cf sshd\[19774\]: Invalid user andre from 106.75.103.35 port 51608
2019-10-23 02:47:32
51.38.125.51 attack
$f2bV_matches
2019-10-23 03:16:27
217.69.168.232 attackspam
Unauthorised access (Oct 22) SRC=217.69.168.232 LEN=40 TTL=247 ID=708 TCP DPT=445 WINDOW=1024 SYN
2019-10-23 03:22:42
181.28.94.205 attackbots
Oct 22 07:38:00 askasleikir sshd[946511]: Failed password for root from 181.28.94.205 port 41228 ssh2
2019-10-23 03:16:02
180.108.46.237 attack
Oct 22 18:36:09 heissa sshd\[4312\]: Invalid user ossie from 180.108.46.237 port 39999
Oct 22 18:36:10 heissa sshd\[4312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.108.46.237
Oct 22 18:36:11 heissa sshd\[4312\]: Failed password for invalid user ossie from 180.108.46.237 port 39999 ssh2
Oct 22 18:41:14 heissa sshd\[5180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.108.46.237  user=root
Oct 22 18:41:16 heissa sshd\[5180\]: Failed password for root from 180.108.46.237 port 58214 ssh2
2019-10-23 02:57:59
106.12.21.212 attack
Oct 22 13:36:54 h2177944 sshd\[1882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.212  user=root
Oct 22 13:36:56 h2177944 sshd\[1882\]: Failed password for root from 106.12.21.212 port 43404 ssh2
Oct 22 13:43:38 h2177944 sshd\[2252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.212  user=root
Oct 22 13:43:39 h2177944 sshd\[2252\]: Failed password for root from 106.12.21.212 port 50250 ssh2
...
2019-10-23 03:01:53
163.172.207.104 attackspambots
\[2019-10-22 14:40:02\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T14:40:02.245-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="000000000000011972592277524",SessionID="0x7f61307f6da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/52159",ACLName="no_extension_match"
\[2019-10-22 14:44:11\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T14:44:11.555-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0000000000000011972592277524",SessionID="0x7f61307f6da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/52476",ACLName="no_extension_match"
\[2019-10-22 14:48:09\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-22T14:48:09.346-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00000000000000011972592277524",SessionID="0x7f61300a2fa8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IP
2019-10-23 02:57:04
176.215.112.82 attackbotsspam
Chat Spam
2019-10-23 03:18:26
45.33.14.194 attackspambots
Oct 22 14:05:41 nxxxxxxx sshd[11517]: refused connect from 45.33.14.194 (45.=
33.14.194)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.33.14.194
2019-10-23 03:09:02
203.48.246.66 attackbots
Automatic report - Banned IP Access
2019-10-23 03:13:38
139.59.56.121 attackbotsspam
Oct 22 18:33:46 unicornsoft sshd\[17060\]: Invalid user zimbra from 139.59.56.121
Oct 22 18:33:46 unicornsoft sshd\[17060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
Oct 22 18:33:48 unicornsoft sshd\[17060\]: Failed password for invalid user zimbra from 139.59.56.121 port 54506 ssh2
2019-10-23 02:58:57
36.236.10.126 attack
Honeypot attack, port: 23, PTR: 36-236-10-126.dynamic-ip.hinet.net.
2019-10-23 02:58:28
75.118.0.117 attack
Invalid user pi from 75.118.0.117 port 47864
2019-10-23 02:51:56
79.137.72.98 attack
2019-10-22T16:26:53.382077lon01.zurich-datacenter.net sshd\[16347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-79-137-72.eu  user=root
2019-10-22T16:26:54.897447lon01.zurich-datacenter.net sshd\[16347\]: Failed password for root from 79.137.72.98 port 45384 ssh2
2019-10-22T16:30:47.443302lon01.zurich-datacenter.net sshd\[16419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-79-137-72.eu  user=root
2019-10-22T16:30:49.416069lon01.zurich-datacenter.net sshd\[16419\]: Failed password for root from 79.137.72.98 port 37657 ssh2
2019-10-22T16:34:45.101524lon01.zurich-datacenter.net sshd\[16488\]: Invalid user testuser from 79.137.72.98 port 58164
...
2019-10-23 02:45:30
182.16.103.136 attack
2019-10-22T12:45:49.698026abusebot-2.cloudsearch.cf sshd\[5546\]: Invalid user beth from 182.16.103.136 port 53768
2019-10-23 03:20:36

Recently Reported IPs

137.226.198.244 137.226.199.196 137.226.62.168 137.226.214.50
137.226.220.35 137.226.205.192 137.226.48.236 175.206.113.93
137.226.77.11 137.226.175.221 80.95.241.4 40.92.23.42
40.92.91.33 40.92.74.20 137.226.155.34 137.226.137.175
137.226.155.32 137.226.79.64 137.226.104.112 137.226.91.236