Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.219.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.219.105.		IN	A

;; AUTHORITY SECTION:
.			358	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 08:45:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 105.219.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.219.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.67.178.250 attackspam
MYH,DEF GET /downloader/
2019-11-17 01:29:39
103.22.250.194 attack
LAMP,DEF GET /wp-login.php
2019-11-17 01:29:02
212.232.58.124 attackbotsspam
23/tcp
[2019-11-16]1pkt
2019-11-17 01:27:59
122.195.200.36 attack
fire
2019-11-17 01:08:24
218.92.0.203 attack
Nov 16 17:41:49 zeus sshd[2915]: Failed password for root from 218.92.0.203 port 58517 ssh2
Nov 16 17:41:53 zeus sshd[2915]: Failed password for root from 218.92.0.203 port 58517 ssh2
Nov 16 17:41:57 zeus sshd[2915]: Failed password for root from 218.92.0.203 port 58517 ssh2
Nov 16 17:42:53 zeus sshd[2924]: Failed password for root from 218.92.0.203 port 29204 ssh2
2019-11-17 01:46:53
119.188.210.75 attackbotsspam
Invalid user riedel from 119.188.210.75 port 57673
2019-11-17 01:28:11
191.240.202.97 attackbotsspam
23/tcp
[2019-11-16]1pkt
2019-11-17 01:43:03
68.151.224.109 attack
[portscan] Port scan
2019-11-17 01:41:08
82.78.228.71 attackbotsspam
8080/tcp
[2019-11-16]1pkt
2019-11-17 01:12:11
189.60.23.90 attackspam
60001/tcp
[2019-11-16]1pkt
2019-11-17 01:37:14
109.187.223.250 attackbots
1433/tcp
[2019-11-16]1pkt
2019-11-17 01:48:41
41.142.60.137 attackspam
41.142.60.137 - \[asDomaincom\] \[16/Nov/2019:06:35:44 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 2541.142.60.137 - ateprotools \[16/Nov/2019:06:54:23 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 2541.142.60.137 - ateprotools \[16/Nov/2019:07:17:06 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25
...
2019-11-17 01:34:58
222.186.173.154 attackspam
Nov 16 07:38:28 web1 sshd\[21961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Nov 16 07:38:30 web1 sshd\[21961\]: Failed password for root from 222.186.173.154 port 42188 ssh2
Nov 16 07:38:33 web1 sshd\[21961\]: Failed password for root from 222.186.173.154 port 42188 ssh2
Nov 16 07:38:36 web1 sshd\[21961\]: Failed password for root from 222.186.173.154 port 42188 ssh2
Nov 16 07:38:39 web1 sshd\[21961\]: Failed password for root from 222.186.173.154 port 42188 ssh2
2019-11-17 01:53:23
177.195.60.177 attackbotsspam
Automatic report - Port Scan Attack
2019-11-17 01:13:34
210.56.20.181 attackspam
Nov 16 16:36:51 XXX sshd[17999]: Invalid user earl from 210.56.20.181 port 34304
2019-11-17 01:26:35

Recently Reported IPs

137.226.218.212 137.226.92.170 137.226.104.197 53.77.92.93
137.226.94.49 137.226.107.90 137.226.253.97 137.226.112.122
137.226.107.199 137.226.214.238 137.226.60.75 137.226.143.117
137.226.210.179 137.226.139.254 137.226.213.114 169.229.18.83
169.229.18.119 137.226.217.67 137.226.222.109 169.229.41.63