Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.229.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.229.140.		IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 22:08:17 CST 2022
;; MSG SIZE  rcvd: 108
Host info
140.229.226.137.in-addr.arpa domain name pointer win10ita249.ita.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.229.226.137.in-addr.arpa	name = win10ita249.ita.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.231.245.21 attackspam
2019-07-18T01:15:28.311008abusebot.cloudsearch.cf sshd\[28303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.245.21  user=root
2019-07-18 17:06:24
103.86.141.34 attackspam
proto=tcp  .  spt=52918  .  dpt=25  .     (listed on Blocklist de  Jul 17)     (88)
2019-07-18 17:34:18
217.112.128.193 attackbots
2019-07-18T02:54:27.432322MailD postfix/smtpd[24820]: NOQUEUE: reject: RCPT from steep.jamihydraulics.com[217.112.128.193]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
2019-07-18T03:04:46.182805MailD postfix/smtpd[26221]: NOQUEUE: reject: RCPT from steep.jamihydraulics.com[217.112.128.193]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
2019-07-18T03:15:08.053345MailD postfix/smtpd[27314]: NOQUEUE: reject: RCPT from steep.jamihydraulics.com[217.112.128.193]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
2019-07-18 17:13:59
96.1.105.126 attackspambots
Jul 15 19:29:33 proxmox sshd[30673]: Invalid user oracle from 96.1.105.126 port 49342
Jul 15 19:29:33 proxmox sshd[30673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.1.105.126
Jul 15 19:29:35 proxmox sshd[30673]: Failed password for invalid user oracle from 96.1.105.126 port 49342 ssh2
Jul 15 19:29:35 proxmox sshd[30673]: Received disconnect from 96.1.105.126 port 49342:11: Bye Bye [preauth]
Jul 15 19:29:35 proxmox sshd[30673]: Disconnected from 96.1.105.126 port 49342 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=96.1.105.126
2019-07-18 17:27:08
164.132.205.21 attackspambots
Jul 18 07:06:06 localhost sshd\[44632\]: Invalid user jl from 164.132.205.21 port 39144
Jul 18 07:06:06 localhost sshd\[44632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.205.21
...
2019-07-18 17:53:34
180.246.148.49 attackspambots
Unauthorised access (Jul 18) SRC=180.246.148.49 LEN=52 TTL=116 ID=21911 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-18 17:19:48
106.75.219.17 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:54:18,978 INFO [shellcode_manager] (106.75.219.17) no match, writing hexdump (adf04dff6303268534c6a6d0aca1a877 :2178331) - MS17010 (EternalBlue)
2019-07-18 17:22:58
92.54.200.66 attackspam
email spam
2019-07-18 18:04:40
213.32.18.189 attack
Jul 18 08:30:11 MK-Soft-VM3 sshd\[22970\]: Invalid user rs from 213.32.18.189 port 39560
Jul 18 08:30:11 MK-Soft-VM3 sshd\[22970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.18.189
Jul 18 08:30:13 MK-Soft-VM3 sshd\[22970\]: Failed password for invalid user rs from 213.32.18.189 port 39560 ssh2
...
2019-07-18 17:09:48
103.28.57.86 attackbotsspam
Jul 18 10:49:56 vps647732 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.57.86
Jul 18 10:49:58 vps647732 sshd[6737]: Failed password for invalid user serge from 103.28.57.86 port 50455 ssh2
...
2019-07-18 17:07:24
179.95.191.173 attack
Automatic report - Port Scan Attack
2019-07-18 17:32:19
188.162.229.126 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-17 02:49:53,644 INFO [shellcode_manager] (188.162.229.126) no match, writing hexdump (6ba178ec85189048ec2985136600fbc9 :15549) - SMB (Unknown)
2019-07-18 17:10:07
81.214.253.122 attackbotsspam
Netgear DGN Device Remote Command Execution Vulnerability
2019-07-18 17:07:58
46.166.151.47 attack
\[2019-07-18 05:09:46\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:09:46.628-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146313113291",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51055",ACLName="no_extension_match"
\[2019-07-18 05:12:13\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:12:13.287-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="46363302946",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59825",ACLName="no_extension_match"
\[2019-07-18 05:13:47\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-18T05:13:47.736-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607533",SessionID="0x7f06f85ff978",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64372",ACLName="no_extens
2019-07-18 17:21:46
185.104.121.5 attack
Automatic report - Banned IP Access
2019-07-18 17:15:41

Recently Reported IPs

137.226.228.182 137.226.229.207 137.226.230.26 137.226.230.177
137.226.230.194 137.226.231.61 137.226.231.102 169.229.8.159
169.229.3.48 169.229.8.243 169.229.100.231 169.229.100.191
169.229.11.34 169.229.11.81 169.229.236.114 125.24.150.233
137.226.227.91 137.226.219.81 137.226.220.230 137.226.226.147