Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.45.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.45.128.			IN	A

;; AUTHORITY SECTION:
.			212	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 01:34:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 128.45.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.45.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.245.85.62 attackspam
Chat Spam
2019-11-30 04:09:58
71.6.232.6 attackspambots
11/29/2019-19:22:29.977160 71.6.232.6 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-11-30 04:05:11
129.226.68.217 attackspambots
Nov 29 16:42:47 hcbbdb sshd\[18361\]: Invalid user chatha from 129.226.68.217
Nov 29 16:42:47 hcbbdb sshd\[18361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.68.217
Nov 29 16:42:49 hcbbdb sshd\[18361\]: Failed password for invalid user chatha from 129.226.68.217 port 48500 ssh2
Nov 29 16:47:02 hcbbdb sshd\[18794\]: Invalid user wanglanying from 129.226.68.217
Nov 29 16:47:02 hcbbdb sshd\[18794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.68.217
2019-11-30 04:30:21
84.22.145.1 attack
SSH login attempts with user root.
2019-11-30 04:41:48
203.154.78.176 attackbotsspam
11/29/2019-10:07:26.199498 203.154.78.176 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-30 04:27:01
94.180.9.2 attackbots
SSH login attempts with user root.
2019-11-30 04:34:06
203.76.248.49 attackbots
Unauthorised access (Nov 29) SRC=203.76.248.49 LEN=52 TTL=118 ID=27330 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 29) SRC=203.76.248.49 LEN=52 TTL=116 ID=29918 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 04:16:13
212.129.140.89 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-30 04:11:21
196.52.43.58 attackbotsspam
11/29/2019-19:11:39.421710 196.52.43.58 Protocol: 17 GPL DNS named version attempt
2019-11-30 04:06:44
120.41.139.158 attackbotsspam
Unauthorised access (Nov 29) SRC=120.41.139.158 LEN=40 TTL=243 ID=1962 TCP DPT=1433 WINDOW=1024 SYN
2019-11-30 04:28:38
173.236.72.146 attackbotsspam
Automatic report - Banned IP Access
2019-11-30 04:28:09
89.203.150.4 attack
web Attack on Website
2019-11-30 04:39:06
117.102.105.203 attackbotsspam
Nov 29 14:32:04 firewall sshd[15614]: Failed password for invalid user ns2c from 117.102.105.203 port 53828 ssh2
Nov 29 14:35:39 firewall sshd[15749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.105.203  user=root
Nov 29 14:35:41 firewall sshd[15749]: Failed password for root from 117.102.105.203 port 33516 ssh2
...
2019-11-30 04:26:48
72.48.214.68 attackbots
Nov 29 21:38:26 microserver sshd[28655]: Invalid user php from 72.48.214.68 port 52284
Nov 29 21:38:26 microserver sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 21:38:28 microserver sshd[28655]: Failed password for invalid user php from 72.48.214.68 port 52284 ssh2
Nov 29 21:38:38 microserver sshd[28689]: Invalid user usuario from 72.48.214.68 port 52652
Nov 29 21:38:38 microserver sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:42 microserver sshd[32999]: Invalid user dennis from 72.48.214.68 port 35318
Nov 29 22:04:42 microserver sshd[32999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:44 microserver sshd[32999]: Failed password for invalid user dennis from 72.48.214.68 port 35318 ssh2
Nov 29 22:04:52 microserver sshd[33010]: Invalid user tao from 72.48.214.68 port 35718
Nov 29 22:04:52
2019-11-30 04:13:13
14.177.235.102 attackbots
Nov 29 22:07:41 lcl-usvr-01 sshd[1656]: refused connect from 14.177.235.102 (14.177.235.102)
Nov 29 22:07:46 lcl-usvr-01 sshd[1665]: refused connect from 14.177.235.102 (14.177.235.102)
Nov 29 22:07:52 lcl-usvr-01 sshd[1714]: refused connect from 14.177.235.102 (14.177.235.102)
2019-11-30 04:10:53

Recently Reported IPs

137.226.41.144 180.76.32.92 137.226.127.16 131.161.8.237
137.226.31.17 137.226.39.122 137.226.31.189 137.226.39.249
137.226.24.21 118.208.117.140 137.226.210.86 96.93.236.225
137.226.27.78 137.226.23.0 137.226.23.195 180.76.46.139
169.229.124.236 169.229.105.217 137.226.71.135 180.76.210.201