Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.50.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.50.122.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 05:40:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 122.50.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.50.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.140.229.115 attackspam
$f2bV_matches
2020-01-17 21:24:30
91.250.85.56 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-17 21:23:57
113.22.216.110 attack
unauthorized connection attempt
2020-01-17 20:59:37
186.204.82.22 attack
unauthorized connection attempt
2020-01-17 20:56:26
82.209.235.1 attackbotsspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-17 21:25:32
88.249.197.169 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-17 21:24:13
5.196.75.24 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-17 21:23:10
49.234.64.252 attackbots
Unauthorized connection attempt detected from IP address 49.234.64.252 to port 2220 [J]
2020-01-17 21:15:20
58.210.180.162 attackspambots
Jan 17 16:04:35 hosting sshd[17391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.180.162  user=root
Jan 17 16:04:37 hosting sshd[17391]: Failed password for root from 58.210.180.162 port 42240 ssh2
Jan 17 16:04:44 hosting sshd[17394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.180.162  user=root
Jan 17 16:04:46 hosting sshd[17394]: Failed password for root from 58.210.180.162 port 45740 ssh2
Jan 17 16:04:49 hosting sshd[17397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.180.162  user=root
Jan 17 16:04:51 hosting sshd[17397]: Failed password for root from 58.210.180.162 port 52286 ssh2
...
2020-01-17 21:24:47
42.119.60.216 attackspambots
unauthorized connection attempt
2020-01-17 21:03:38
109.242.73.4 attack
unauthorized connection attempt
2020-01-17 20:59:58
213.248.242.48 attackspambots
Sending SPAM email
2020-01-17 21:11:25
81.200.82.143 attackbotsspam
unauthorized connection attempt
2020-01-17 21:01:30
189.209.165.136 attackspam
unauthorized connection attempt
2020-01-17 21:06:06
14.164.56.163 attack
unauthorized connection attempt
2020-01-17 21:04:15

Recently Reported IPs

137.226.210.74 137.226.53.202 137.226.171.7 137.226.175.16
137.226.58.94 137.226.61.127 169.229.12.42 131.161.9.102
137.226.210.252 43.138.56.237 46.236.78.13 137.226.215.45
173.82.252.145 137.226.217.236 62.122.241.35 137.226.201.83
137.226.205.85 137.226.222.164 190.4.13.146 137.226.149.128