Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.6.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.6.22.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062100 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 21 16:54:17 CST 2022
;; MSG SIZE  rcvd: 105
Host info
22.6.226.137.in-addr.arpa domain name pointer s-db-t01.itc.rwth-aachen.de.
22.6.226.137.in-addr.arpa domain name pointer s-db-t01.admin.campus.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.6.226.137.in-addr.arpa	name = s-db-t01.admin.campus.rwth-aachen.de.
22.6.226.137.in-addr.arpa	name = s-db-t01.itc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.160.65.39 attackbots
1580564100 - 02/01/2020 14:35:00 Host: 125.160.65.39/125.160.65.39 Port: 445 TCP Blocked
2020-02-02 02:28:23
106.12.112.49 attackspam
Feb  1 14:43:31 vpn01 sshd[14309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.112.49
Feb  1 14:43:32 vpn01 sshd[14309]: Failed password for invalid user ftpuser from 106.12.112.49 port 41088 ssh2
...
2020-02-02 02:24:08
177.128.144.164 attackbots
Unauthorized connection attempt detected from IP address 177.128.144.164 to port 8080 [J]
2020-02-02 02:16:55
202.94.83.72 attack
Honeypot attack, port: 445, PTR: 202-94-83-72.infra.usd.ac.id.
2020-02-02 02:22:47
1.54.134.139 attackbots
23/tcp
[2020-02-01]1pkt
2020-02-02 02:34:06
144.217.188.81 attackbots
...
2020-02-02 02:38:09
87.26.36.206 attackbots
Unauthorized connection attempt from IP address 87.26.36.206 on Port 445(SMB)
2020-02-02 02:42:37
118.163.186.176 attackbotsspam
Unauthorised access (Feb  1) SRC=118.163.186.176 LEN=40 TTL=235 ID=30659 TCP DPT=1433 WINDOW=1024 SYN
2020-02-02 02:03:06
5.116.149.54 attackspambots
445/tcp
[2020-02-01]1pkt
2020-02-02 02:22:07
139.99.22.94 attack
2020-02-01T15:01:24.862381hz01.yumiweb.com sshd\[6650\]: Invalid user admin from 139.99.22.94 port 57969
2020-02-01T15:01:26.470579hz01.yumiweb.com sshd\[6652\]: Invalid user admin from 139.99.22.94 port 58734
2020-02-01T15:01:28.071920hz01.yumiweb.com sshd\[6654\]: Invalid user user from 139.99.22.94 port 59286
...
2020-02-02 02:36:38
116.255.104.133 attackbotsspam
Unauthorized connection attempt detected from IP address 116.255.104.133 to port 4567 [J]
2020-02-02 02:23:53
144.217.214.13 attackbots
Unauthorized connection attempt detected from IP address 144.217.214.13 to port 2220 [J]
2020-02-02 02:36:17
144.48.108.42 attack
...
2020-02-02 02:07:28
144.217.91.86 attackspambots
...
2020-02-02 02:17:21
41.169.150.250 attackbots
Unauthorized connection attempt detected from IP address 41.169.150.250 to port 2220 [J]
2020-02-02 02:17:44

Recently Reported IPs

137.226.18.12 137.226.18.247 137.226.19.9 137.226.15.11
137.226.17.248 137.226.15.49 180.76.96.217 180.76.44.9
180.76.92.248 180.76.94.223 180.76.44.30 180.76.42.3
169.229.252.39 180.76.40.152 180.76.42.178 180.76.72.231
180.76.83.133 180.76.98.194 180.76.41.126 242.100.128.160