Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.49.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.49.219.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 15:58:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
219.49.226.137.in-addr.arpa domain name pointer n7k-sw23-1-et2-6-3112.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.49.226.137.in-addr.arpa	name = n7k-sw23-1-et2-6-3112.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.225.175.182 attackbotsspam
Jan 11 05:47:04 grey postfix/smtpd\[10127\]: NOQUEUE: reject: RCPT from 2-225-175-182.ip176.fastwebnet.it\[2.225.175.182\]: 554 5.7.1 Service unavailable\; Client host \[2.225.175.182\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[2.225.175.182\]\; from=\ to=\ proto=ESMTP helo=\<2-225-175-182.ip176.fastwebnet.it\>
...
2020-01-11 20:35:20
159.65.151.216 attackbots
$f2bV_matches
2020-01-11 20:11:32
190.128.198.14 attackspambots
20/1/11@06:50:25: FAIL: Alarm-Network address from=190.128.198.14
...
2020-01-11 20:31:39
125.128.244.235 attack
Jan 11 11:17:09 work-partkepr sshd\[9852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.128.244.235  user=root
Jan 11 11:17:11 work-partkepr sshd\[9852\]: Failed password for root from 125.128.244.235 port 41598 ssh2
...
2020-01-11 20:25:50
164.138.170.119 attackbots
Unauthorized connection attempt from IP address 164.138.170.119 on Port 445(SMB)
2020-01-11 20:24:33
49.145.106.162 attackbots
Unauthorized connection attempt from IP address 49.145.106.162 on Port 445(SMB)
2020-01-11 20:03:04
113.190.255.114 attack
Unauthorized connection attempt from IP address 113.190.255.114 on Port 445(SMB)
2020-01-11 20:23:42
116.104.137.104 attack
Unauthorized connection attempt from IP address 116.104.137.104 on Port 445(SMB)
2020-01-11 20:20:16
103.201.143.16 attackspam
port scan and connect, tcp 23 (telnet)
2020-01-11 20:12:03
82.196.4.66 attackbots
Unauthorized connection attempt detected from IP address 82.196.4.66 to port 2220 [J]
2020-01-11 20:34:36
159.203.201.175 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 8091 proto: TCP cat: Misc Attack
2020-01-11 20:32:44
148.66.146.29 attackspam
SQL injection:/index.php?menu_selected=144'&sub_menu_selected=1023'&language=FR'&ID_PRJ=50400'"
2020-01-11 20:45:07
183.82.124.145 attack
Unauthorized connection attempt from IP address 183.82.124.145 on Port 445(SMB)
2020-01-11 20:07:31
36.83.102.59 attackspam
Unauthorized connection attempt from IP address 36.83.102.59 on Port 445(SMB)
2020-01-11 20:19:48
133.242.79.30 attackspam
Jan 11 14:22:56 webhost01 sshd[22853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30
Jan 11 14:22:57 webhost01 sshd[22853]: Failed password for invalid user jamesm from 133.242.79.30 port 53196 ssh2
...
2020-01-11 20:45:30

Recently Reported IPs

137.226.49.174 137.226.49.249 160.251.72.75 137.226.50.200
137.226.51.2 164.88.199.243 137.226.51.88 137.226.51.148
137.226.52.155 137.226.55.192 180.122.204.241 180.125.106.144
137.226.59.63 181.15.102.19 102.68.129.18 181.48.139.117
181.88.198.63 182.34.215.204 137.226.59.186 182.43.41.166