Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.242.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.242.134.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:09:03 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 134.242.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.242.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.30 attack
ET DROP Dshield Block Listed Source group 1 - port: 19314 proto: TCP cat: Misc Attack
2020-05-23 16:13:27
195.54.160.211 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 55555 proto: TCP cat: Misc Attack
2020-05-23 16:12:11
1.2.138.164 attackspambots
Invalid user admin from 1.2.138.164 port 54440
2020-05-23 15:52:33
51.79.50.172 attackspam
May 23 04:33:26 firewall sshd[32362]: Invalid user rfb from 51.79.50.172
May 23 04:33:28 firewall sshd[32362]: Failed password for invalid user rfb from 51.79.50.172 port 38496 ssh2
May 23 04:37:12 firewall sshd[32465]: Invalid user mng from 51.79.50.172
...
2020-05-23 15:39:35
213.244.123.182 attackbots
k+ssh-bruteforce
2020-05-23 16:00:21
47.30.203.134 attackspam
Invalid user r00t from 47.30.203.134 port 45908
2020-05-23 15:42:36
195.54.160.212 attackspam
May 23 08:06:42 debian-2gb-nbg1-2 kernel: \[12472815.921120\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.160.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=23299 PROTO=TCP SPT=43102 DPT=33330 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-23 16:11:41
204.48.19.178 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 16:02:59
218.161.119.91 attack
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:59:48
220.132.182.203 attackbotsspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 15:57:17
223.205.219.123 attackspambots
Invalid user service from 223.205.219.123 port 24811
2020-05-23 15:53:10
195.54.167.120 attackbots
Port scan on 3 port(s): 4203 4208 4212
2020-05-23 16:08:09
14.143.107.226 attack
Invalid user mudehwec from 14.143.107.226 port 21947
2020-05-23 15:50:11
195.54.160.213 attack
Port scan on 3 port(s): 22341 22365 22368
2020-05-23 16:11:24
213.32.10.226 attack
Invalid user thq from 213.32.10.226 port 53328
2020-05-23 16:00:42

Recently Reported IPs

180.76.161.147 124.191.160.247 45.189.254.2 8.209.78.194
180.76.158.48 169.229.146.9 137.226.30.177 137.226.237.44
202.95.1.13 180.76.60.244 137.226.248.251 137.226.246.6
169.229.148.42 169.229.253.129 169.229.174.157 180.76.160.155
180.76.112.44 137.226.240.242 85.208.209.179 137.226.247.239