Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.214.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.214.134.		IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 06:17:32 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.214.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.214.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.140.172.181 attack
Jul 25 07:11:07 vps647732 sshd[21788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.140.172.181
Jul 25 07:11:09 vps647732 sshd[21788]: Failed password for invalid user rachelle from 210.140.172.181 port 36064 ssh2
...
2020-07-25 19:00:23
110.166.82.211 attackbots
Invalid user yk from 110.166.82.211 port 43610
2020-07-25 19:15:57
159.65.189.115 attack
Jul 25 11:35:50 dev0-dcde-rnet sshd[30117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.189.115
Jul 25 11:35:52 dev0-dcde-rnet sshd[30117]: Failed password for invalid user ypf from 159.65.189.115 port 43738 ssh2
Jul 25 11:41:38 dev0-dcde-rnet sshd[30253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.189.115
2020-07-25 18:50:34
107.172.249.134 attack
Unauthorized connection attempt detected from IP address 107.172.249.134 to port 8088
2020-07-25 19:00:01
101.21.144.209 attackbotsspam
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-07-25 18:55:50
148.70.169.14 attackspam
Invalid user punit from 148.70.169.14 port 56820
2020-07-25 19:09:46
218.92.0.207 attackbotsspam
Jul 25 12:03:14 pve1 sshd[20855]: Failed password for root from 218.92.0.207 port 46642 ssh2
Jul 25 12:03:17 pve1 sshd[20855]: Failed password for root from 218.92.0.207 port 46642 ssh2
...
2020-07-25 19:16:15
201.244.154.195 attackbots
Invalid user postgres from 201.244.154.195 port 54064
2020-07-25 18:44:53
193.112.107.200 attackspam
$f2bV_matches
2020-07-25 18:47:30
191.102.83.164 attack
Invalid user wanghaoyu from 191.102.83.164 port 9729
2020-07-25 19:05:26
46.161.14.13 attackbots
Port Scan
...
2020-07-25 18:56:25
167.71.139.81 attack
reported through recidive - multiple failed attempts(SSH)
2020-07-25 18:45:22
79.172.193.32 attack
xmlrpc attack
2020-07-25 18:52:24
42.159.155.8 attack
2020-07-25T17:06:38.429730hostname sshd[85151]: Invalid user kong from 42.159.155.8 port 1600
...
2020-07-25 18:46:14
128.199.167.161 attack
2020-07-24 UTC: (2x) - samara(2x)
2020-07-25 18:55:08

Recently Reported IPs

137.226.250.226 137.226.163.148 137.226.177.255 137.226.199.2
137.226.172.64 137.226.202.47 137.226.221.93 137.226.213.149
103.202.221.240 137.226.183.105 2.100.49.241 5.25.103.117
169.229.228.15 137.226.61.68 180.76.54.233 137.226.16.24
180.76.55.185 180.76.55.125 180.76.59.70 180.76.59.113