Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.29.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.29.50.			IN	A

;; AUTHORITY SECTION:
.			584	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:13:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 50.29.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.29.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.141.40.237 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-09-18 22:02:47
120.133.136.191 attackbotsspam
Lines containing failures of 120.133.136.191
Sep 17 08:04:45 hgb10502 sshd[27465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.133.136.191  user=r.r
Sep 17 08:04:46 hgb10502 sshd[27465]: Failed password for r.r from 120.133.136.191 port 48393 ssh2
Sep 17 08:04:47 hgb10502 sshd[27465]: Received disconnect from 120.133.136.191 port 48393:11: Bye Bye [preauth]
Sep 17 08:04:47 hgb10502 sshd[27465]: Disconnected from authenticating user r.r 120.133.136.191 port 48393 [preauth]
Sep 17 08:26:01 hgb10502 sshd[30512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.133.136.191  user=r.r
Sep 17 08:26:03 hgb10502 sshd[30512]: Failed password for r.r from 120.133.136.191 port 44689 ssh2
Sep 17 08:26:06 hgb10502 sshd[30512]: Received disconnect from 120.133.136.191 port 44689:11: Bye Bye [preauth]
Sep 17 08:26:06 hgb10502 sshd[30512]: Disconnected from authenticating user r.r 120.133.136.191 p........
------------------------------
2020-09-18 22:31:32
2a01:4f8:241:5389::2 attackspambots
xmlrpc attack
2020-09-18 21:55:48
117.220.0.146 attack
Unauthorized connection attempt from IP address 117.220.0.146 on Port 445(SMB)
2020-09-18 22:13:35
143.110.200.144 attackbotsspam
Sep 18 15:16:12 server sshd[3121]: Failed password for root from 143.110.200.144 port 51848 ssh2
Sep 18 15:20:34 server sshd[5301]: Failed password for root from 143.110.200.144 port 57584 ssh2
Sep 18 15:23:09 server sshd[6550]: Failed password for root from 143.110.200.144 port 43466 ssh2
2020-09-18 22:09:33
202.188.20.123 attackbots
2020-09-18 08:55:44.632214-0500  localhost sshd[87008]: Failed password for root from 202.188.20.123 port 54556 ssh2
2020-09-18 22:16:52
162.243.22.191 attack
Sep 18 12:47:58 jane sshd[21352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.22.191 
Sep 18 12:48:00 jane sshd[21352]: Failed password for invalid user ipad from 162.243.22.191 port 44783 ssh2
...
2020-09-18 22:09:53
103.28.52.84 attack
DATE:2020-09-18 14:06:55, IP:103.28.52.84, PORT:ssh SSH brute force auth (docker-dc)
2020-09-18 22:01:14
95.77.240.183 attackbotsspam
Sep 17 14:00:45 logopedia-1vcpu-1gb-nyc1-01 sshd[377089]: Failed password for root from 95.77.240.183 port 34970 ssh2
...
2020-09-18 22:06:01
59.50.29.209 attack
[Thu Sep 17 12:43:34 2020 GMT] bdsfewjntw@126.com [RDNS_NONE], Subject: 发票代开13564999872李
2020-09-18 22:17:53
74.120.14.30 attackbotsspam
 TCP (SYN) 74.120.14.30:23411 -> port 445, len 44
2020-09-18 22:00:40
178.62.115.86 attack
2020-09-18T15:13:47+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-18 22:07:43
47.17.177.110 attackbots
(sshd) Failed SSH login from 47.17.177.110 (US/United States/ool-2f11b16e.dyn.optonline.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 18 09:26:46 optimus sshd[11779]: Failed password for root from 47.17.177.110 port 55886 ssh2
Sep 18 09:36:07 optimus sshd[15613]: Invalid user ebd from 47.17.177.110
Sep 18 09:36:08 optimus sshd[15613]: Failed password for invalid user ebd from 47.17.177.110 port 39580 ssh2
Sep 18 09:45:09 optimus sshd[18936]: Failed password for root from 47.17.177.110 port 51500 ssh2
Sep 18 09:54:17 optimus sshd[21955]: Invalid user test from 47.17.177.110
2020-09-18 21:58:53
107.170.20.247 attackbots
Sep 18 13:00:19 mail sshd[25755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247
2020-09-18 22:08:11
138.204.149.234 attackbots
Unauthorized connection attempt from IP address 138.204.149.234 on Port 445(SMB)
2020-09-18 22:00:25

Recently Reported IPs

137.226.29.189 137.226.30.81 137.226.21.66 137.226.17.146
169.229.72.224 137.226.17.61 169.229.72.70 169.229.71.199
169.229.73.117 137.226.19.119 137.226.57.163 137.226.14.174
169.229.216.87 137.226.19.170 169.229.72.195 169.229.72.253
169.229.73.172 180.76.39.4 169.229.175.19 111.206.221.211