Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.204.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.204.22.			IN	A

;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 11:09:57 CST 2022
;; MSG SIZE  rcvd: 107
Host info
22.204.226.137.in-addr.arpa domain name pointer hcpg11-008.iaas.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.204.226.137.in-addr.arpa	name = hcpg11-008.iaas.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.199.193.202 attack
Nov  7 10:48:34 MK-Soft-VM7 sshd[16670]: Failed password for root from 139.199.193.202 port 49150 ssh2
Nov  7 10:54:40 MK-Soft-VM7 sshd[16714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202 
...
2019-11-07 18:02:56
171.117.73.219 attackspam
Fail2Ban Ban Triggered
2019-11-07 18:18:52
184.66.225.102 attackspam
Nov 07 02:04:58 askasleikir sshd[28296]: Failed password for invalid user www from 184.66.225.102 port 37424 ssh2
2019-11-07 18:18:36
128.199.142.0 attackbotsspam
Nov  7 09:34:24 hcbbdb sshd\[23439\]: Invalid user manbearpig from 128.199.142.0
Nov  7 09:34:24 hcbbdb sshd\[23439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
Nov  7 09:34:26 hcbbdb sshd\[23439\]: Failed password for invalid user manbearpig from 128.199.142.0 port 35362 ssh2
Nov  7 09:39:06 hcbbdb sshd\[24231\]: Invalid user Santos@2017 from 128.199.142.0
Nov  7 09:39:06 hcbbdb sshd\[24231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
2019-11-07 18:11:29
129.205.19.100 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/129.205.19.100/ 
 
 UG - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UG 
 NAME ASN : ASN37063 
 
 IP : 129.205.19.100 
 
 CIDR : 129.205.19.0/24 
 
 PREFIX COUNT : 60 
 
 UNIQUE IP COUNT : 15360 
 
 
 ATTACKS DETECTED ASN37063 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-07 07:25:35 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 18:06:27
162.214.14.226 attackspam
fail2ban honeypot
2019-11-07 17:59:14
124.109.41.97 attackbotsspam
until 2019-11-06T21:38:27+00:00, observations: 2, bad account names: 1
2019-11-07 17:51:44
46.38.144.146 attackbotsspam
2019-11-07T11:18:08.051594mail01 postfix/smtpd[32019]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T11:18:14.166837mail01 postfix/smtpd[5994]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T11:18:19.394388mail01 postfix/smtpd[14106]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07 18:21:12
106.12.94.65 attack
Nov  6 22:42:38 tdfoods sshd\[9939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.65  user=root
Nov  6 22:42:40 tdfoods sshd\[9939\]: Failed password for root from 106.12.94.65 port 47332 ssh2
Nov  6 22:47:29 tdfoods sshd\[10286\]: Invalid user angelina from 106.12.94.65
Nov  6 22:47:29 tdfoods sshd\[10286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.65
Nov  6 22:47:31 tdfoods sshd\[10286\]: Failed password for invalid user angelina from 106.12.94.65 port 53756 ssh2
2019-11-07 18:03:19
119.27.170.64 attackspambots
Nov  7 10:52:00 [munged] sshd[12146]: Failed password for root from 119.27.170.64 port 47672 ssh2
2019-11-07 17:59:03
106.13.35.206 attack
Automatic report - Banned IP Access
2019-11-07 17:45:06
36.155.113.218 attack
Nov  7 00:00:15 hanapaa sshd\[21826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.218  user=root
Nov  7 00:00:16 hanapaa sshd\[21826\]: Failed password for root from 36.155.113.218 port 40005 ssh2
Nov  7 00:04:36 hanapaa sshd\[22153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.218  user=root
Nov  7 00:04:38 hanapaa sshd\[22153\]: Failed password for root from 36.155.113.218 port 57440 ssh2
Nov  7 00:09:25 hanapaa sshd\[22691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.113.218  user=root
2019-11-07 18:18:12
201.149.22.37 attackspambots
Nov  7 09:12:17 server sshd\[4807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37  user=root
Nov  7 09:12:19 server sshd\[4807\]: Failed password for root from 201.149.22.37 port 37282 ssh2
Nov  7 09:22:28 server sshd\[7317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37  user=root
Nov  7 09:22:30 server sshd\[7317\]: Failed password for root from 201.149.22.37 port 38542 ssh2
Nov  7 09:26:11 server sshd\[8409\]: Invalid user pi from 201.149.22.37
...
2019-11-07 17:52:23
200.209.174.76 attackspambots
2019-11-07T07:28:37.088581abusebot-4.cloudsearch.cf sshd\[4536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76  user=root
2019-11-07 17:47:22
138.121.128.20 attack
1433/tcp 445/tcp...
[2019-09-15/11-07]7pkt,2pt.(tcp)
2019-11-07 17:54:34

Recently Reported IPs

137.226.38.208 169.229.64.178 137.226.68.48 169.229.144.24
169.229.144.1 169.229.124.50 169.229.114.243 169.229.144.208
169.229.102.151 169.229.137.223 169.229.121.251 137.226.237.159
137.226.49.177 137.226.200.241 137.226.236.238 137.226.232.248
137.226.200.167 137.226.204.242 137.226.233.230 137.226.30.155