Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.20.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.20.53.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 21:19:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
53.20.226.137.in-addr.arpa domain name pointer seifert.win.iwm.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.20.226.137.in-addr.arpa	name = seifert.win.iwm.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.36.2.215 attack
Automatic report - Port Scan Attack
2020-08-12 08:02:55
24.184.49.144 attackspam
5555/tcp
[2020-08-11]1pkt
2020-08-12 08:13:57
1.160.133.31 attack
Telnet Server BruteForce Attack
2020-08-12 08:10:46
74.97.19.201 attack
Brute-force attempt banned
2020-08-12 08:16:02
94.16.121.91 attackspam
CMS (WordPress or Joomla) login attempt.
2020-08-12 08:22:30
171.249.136.199 attack
ssh brute force, possible password spraying
2020-08-12 07:49:08
220.134.128.54 attackspambots
23/tcp 23/tcp 23/tcp
[2020-08-01/11]3pkt
2020-08-12 07:47:17
188.234.247.110 attackspambots
Aug 12 01:54:59 OPSO sshd\[29102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110  user=root
Aug 12 01:55:01 OPSO sshd\[29102\]: Failed password for root from 188.234.247.110 port 48368 ssh2
Aug 12 01:58:47 OPSO sshd\[30040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110  user=root
Aug 12 01:58:48 OPSO sshd\[30040\]: Failed password for root from 188.234.247.110 port 56642 ssh2
Aug 12 02:02:38 OPSO sshd\[30796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110  user=root
2020-08-12 08:06:58
116.97.203.143 attackspam
445/tcp
[2020-08-11]1pkt
2020-08-12 08:01:23
137.226.113.56 attackbotsspam
4843/tcp 1883/tcp 8883/tcp...
[2020-06-14/08-11]44pkt,5pt.(tcp)
2020-08-12 07:49:20
194.87.138.195 attackspambots
Port Scan
...
2020-08-12 08:11:16
34.75.125.212 attack
Multiple SSH authentication failures from 34.75.125.212
2020-08-12 08:16:33
110.49.71.244 attack
$f2bV_matches
2020-08-12 07:57:40
45.230.191.20 attack
23/tcp
[2020-08-11]1pkt
2020-08-12 08:16:18
92.223.89.6 attack
0,08-02/30 [bc01/m63] PostRequest-Spammer scoring: berlin
2020-08-12 08:11:57

Recently Reported IPs

79.66.184.252 24.153.38.50 24.180.61.38 24.85.172.151
43.155.109.84 104.255.72.235 156.232.6.103 169.229.92.62
169.229.93.221 169.229.26.142 169.229.93.154 169.229.48.14
31.214.255.111 169.229.26.58 169.229.24.199 169.229.26.190
169.229.24.245 169.229.48.93 169.229.48.6 169.229.92.148