Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.220.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.220.12.			IN	A

;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062600 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 22:05:07 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 12.220.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.220.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.173 attackbotsspam
May 30 20:10:26 vps sshd[993536]: Failed password for root from 112.85.42.173 port 64079 ssh2
May 30 20:10:29 vps sshd[993536]: Failed password for root from 112.85.42.173 port 64079 ssh2
May 30 20:10:32 vps sshd[993536]: Failed password for root from 112.85.42.173 port 64079 ssh2
May 30 20:10:36 vps sshd[993536]: Failed password for root from 112.85.42.173 port 64079 ssh2
May 30 20:10:39 vps sshd[993536]: Failed password for root from 112.85.42.173 port 64079 ssh2
...
2020-05-31 02:15:15
117.221.198.116 attack
Unauthorized connection attempt detected from IP address 117.221.198.116 to port 23
2020-05-31 02:32:50
183.157.173.108 attackbots
Unauthorized connection attempt detected from IP address 183.157.173.108 to port 23
2020-05-31 02:25:17
1.213.182.68 attack
k+ssh-bruteforce
2020-05-31 02:17:20
163.53.185.93 attack
Unauthorized connection attempt detected from IP address 163.53.185.93 to port 445
2020-05-31 02:27:33
112.184.237.244 attackbots
Unauthorized connection attempt detected from IP address 112.184.237.244 to port 80
2020-05-31 02:34:46
104.248.121.165 attack
May 30 19:44:34 server sshd[23403]: Failed password for root from 104.248.121.165 port 41498 ssh2
May 30 19:47:55 server sshd[23650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.165
May 30 19:47:57 server sshd[23650]: Failed password for invalid user readonly from 104.248.121.165 port 45678 ssh2
...
2020-05-31 01:54:13
121.176.199.147 attack
Unauthorized connection attempt detected from IP address 121.176.199.147 to port 23
2020-05-31 02:30:09
91.137.27.245 attack
20 attempts against mh-misbehave-ban on comet
2020-05-31 02:04:05
210.14.129.217 attack
Unauthorized connection attempt detected from IP address 210.14.129.217 to port 22
2020-05-31 02:22:07
183.83.91.149 attackspambots
20/5/30@08:08:04: FAIL: Alarm-Network address from=183.83.91.149
...
2020-05-31 02:06:10
218.92.0.138 attackbotsspam
May 30 20:09:12 MainVPS sshd[8698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
May 30 20:09:14 MainVPS sshd[8698]: Failed password for root from 218.92.0.138 port 2614 ssh2
May 30 20:09:28 MainVPS sshd[8698]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 2614 ssh2 [preauth]
May 30 20:09:12 MainVPS sshd[8698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
May 30 20:09:14 MainVPS sshd[8698]: Failed password for root from 218.92.0.138 port 2614 ssh2
May 30 20:09:28 MainVPS sshd[8698]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 2614 ssh2 [preauth]
May 30 20:09:32 MainVPS sshd[8798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
May 30 20:09:34 MainVPS sshd[8798]: Failed password for root from 218.92.0.138 port 30291 ssh2
...
2020-05-31 02:12:27
61.187.149.133 attackspam
(ftpd) Failed FTP login from 61.187.149.133 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 30 16:38:13 ir1 pure-ftpd: (?@61.187.149.133) [WARNING] Authentication failed for user [anonymous]
2020-05-31 01:54:46
122.147.22.213 attackspam
Port probing on unauthorized port 23
2020-05-31 02:08:38
118.45.215.95 attack
Unauthorized connection attempt detected from IP address 118.45.215.95 to port 23
2020-05-31 02:31:50

Recently Reported IPs

137.226.112.152 137.226.220.103 180.76.8.122 169.229.220.234
101.132.190.97 180.76.139.11 137.226.220.85 180.76.137.118
169.229.208.73 169.229.197.51 180.76.16.164 169.229.210.166
180.76.33.255 180.76.34.71 123.125.71.189 180.76.73.81
180.76.59.146 180.76.10.201 180.76.109.246 180.76.138.198