Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.42.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.42.140.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 20:58:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.42.226.137.in-addr.arpa domain name pointer eeltb140.llt.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.42.226.137.in-addr.arpa	name = eeltb140.llt.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
62.234.122.199 attack
Automatic report - Banned IP Access
2019-11-06 14:43:51
106.12.132.66 attackbots
Nov  6 06:58:58 bouncer sshd\[18224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.66  user=root
Nov  6 06:59:01 bouncer sshd\[18224\]: Failed password for root from 106.12.132.66 port 35574 ssh2
Nov  6 07:03:37 bouncer sshd\[18231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.66  user=root
...
2019-11-06 14:17:21
45.82.34.146 attackbotsspam
Autoban   45.82.34.146 AUTH/CONNECT
2019-11-06 14:15:55
175.29.189.26 attack
postfix
2019-11-06 14:17:01
185.162.235.213 attackspambots
Nov  6 07:11:47 sauna sshd[18872]: Failed password for root from 185.162.235.213 port 55910 ssh2
...
2019-11-06 14:20:42
180.118.18.0 attack
2749/udp
[2019-11-06]1pkt
2019-11-06 14:24:16
119.115.33.61 attackbotsspam
8080/tcp
[2019-11-06]1pkt
2019-11-06 14:00:21
210.196.163.32 attackspambots
Nov  6 07:30:26 dedicated sshd[10287]: Invalid user scan from 210.196.163.32 port 12161
2019-11-06 14:41:39
112.85.42.238 attack
Nov  6 06:57:28 h2177944 sshd\[3939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Nov  6 06:57:31 h2177944 sshd\[3939\]: Failed password for root from 112.85.42.238 port 40242 ssh2
Nov  6 06:57:32 h2177944 sshd\[3939\]: Failed password for root from 112.85.42.238 port 40242 ssh2
Nov  6 06:57:35 h2177944 sshd\[3939\]: Failed password for root from 112.85.42.238 port 40242 ssh2
...
2019-11-06 14:15:30
129.211.130.37 attackbotsspam
Nov  6 05:56:43 MK-Soft-Root2 sshd[10220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37 
Nov  6 05:56:45 MK-Soft-Root2 sshd[10220]: Failed password for invalid user tigrou from 129.211.130.37 port 40771 ssh2
...
2019-11-06 14:02:58
118.24.9.152 attackbotsspam
Automatic report - Banned IP Access
2019-11-06 14:04:49
5.196.88.110 attack
Nov  6 05:56:56 localhost sshd\[10575\]: Invalid user aaaaasa from 5.196.88.110 port 41888
Nov  6 05:56:56 localhost sshd\[10575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.88.110
Nov  6 05:56:58 localhost sshd\[10575\]: Failed password for invalid user aaaaasa from 5.196.88.110 port 41888 ssh2
2019-11-06 13:52:29
209.182.245.148 attack
23/tcp
[2019-11-06]1pkt
2019-11-06 14:28:38
49.49.245.132 attackbots
445/tcp
[2019-11-06]1pkt
2019-11-06 14:19:45
96.8.116.171 attackbotsspam
53413/udp
[2019-11-06]1pkt
2019-11-06 14:22:13

Recently Reported IPs

137.226.42.126 119.126.90.234 13.234.239.102 190.90.1.46
137.226.54.209 137.226.43.56 137.226.64.130 137.226.67.6
137.226.40.18 137.226.58.202 137.226.63.243 137.226.63.108
137.226.66.243 137.226.59.15 137.226.63.195 121.5.210.102
137.226.44.85 137.226.64.215 185.44.78.91 195.254.134.10