Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.2.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34741
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.2.6.			IN	A

;; AUTHORITY SECTION:
.			435	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 07:31:10 CST 2022
;; MSG SIZE  rcvd: 104
Host info
6.2.226.137.in-addr.arpa domain name pointer fn-l04.campus.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.2.226.137.in-addr.arpa	name = fn-l04.campus.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.113.161.45 attackspambots
Unauthorized connection attempt detected from IP address 176.113.161.45 to port 80
2020-01-06 03:20:32
188.136.206.76 attackbots
Unauthorized connection attempt detected from IP address 188.136.206.76 to port 23 [J]
2020-01-06 03:45:46
85.99.97.62 attackspam
Unauthorized connection attempt detected from IP address 85.99.97.62 to port 23
2020-01-06 03:28:20
177.86.233.228 attackbots
Unauthorized connection attempt detected from IP address 177.86.233.228 to port 23
2020-01-06 03:19:46
211.220.20.21 attackspam
Unauthorized connection attempt detected from IP address 211.220.20.21 to port 2323 [J]
2020-01-06 03:38:37
138.204.225.226 attack
Unauthorized connection attempt detected from IP address 138.204.225.226 to port 23 [J]
2020-01-06 03:22:35
108.174.56.140 attack
Unauthorized connection attempt detected from IP address 108.174.56.140 to port 22
2020-01-06 03:24:32
178.173.143.201 attackspam
Unauthorized connection attempt detected from IP address 178.173.143.201 to port 80
2020-01-06 03:18:20
96.78.178.158 attack
Unauthorized connection attempt detected from IP address 96.78.178.158 to port 5555 [J]
2020-01-06 03:25:26
185.143.221.85 attackspambots
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 443 proto: TCP cat: Attempted Information Leak
2020-01-06 03:16:43
179.110.117.251 attackspambots
Unauthorized connection attempt detected from IP address 179.110.117.251 to port 8080
2020-01-06 03:18:00
49.231.251.172 attackspam
Unauthorized connection attempt detected from IP address 49.231.251.172 to port 445
2020-01-06 03:31:54
191.115.35.40 attackbots
Unauthorized connection attempt detected from IP address 191.115.35.40 to port 23
2020-01-06 03:13:38
196.52.43.60 attackspam
Unauthorized connection attempt detected from IP address 196.52.43.60 to port 199 [J]
2020-01-06 03:12:13
222.100.6.250 attackspam
Unauthorized connection attempt detected from IP address 222.100.6.250 to port 22
2020-01-06 03:35:39

Recently Reported IPs

43.156.124.217 137.226.2.49 137.226.2.54 137.226.1.248
5.167.66.176 5.167.67.80 23.128.248.57 5.167.66.250
5.167.68.3 5.167.68.11 5.167.68.60 137.226.2.2
23.128.248.99 129.226.17.43 202.165.24.237 137.226.2.116
137.226.2.123 5.167.66.67 193.169.255.234 104.248.153.160