Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aachen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.7.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.7.49.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 14:02:54 CST 2022
;; MSG SIZE  rcvd: 105
Host info
49.7.226.137.in-addr.arpa domain name pointer 137-226-007-049.eduroam.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.7.226.137.in-addr.arpa	name = 137-226-007-049.eduroam.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.75.149.221 attackspam
Bruteforce on smtp
2019-10-12 13:59:01
104.197.58.239 attackspambots
2019-10-11T15:44:01.668012abusebot-4.cloudsearch.cf sshd\[9961\]: Invalid user Qwerty\# from 104.197.58.239 port 42710
2019-10-12 13:46:57
173.245.239.178 attack
B: Abusive content scan (200)
2019-10-12 13:22:48
2607:f298:5:102b::9fb:6872 attack
Automatic report - XMLRPC Attack
2019-10-12 14:01:29
200.59.82.169 attackbotsspam
SMB Server BruteForce Attack
2019-10-12 14:14:14
49.232.53.240 attack
Oct 11 18:39:09 server sshd\[25590\]: User root from 49.232.53.240 not allowed because listed in DenyUsers
Oct 11 18:39:09 server sshd\[25590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.53.240  user=root
Oct 11 18:39:11 server sshd\[25590\]: Failed password for invalid user root from 49.232.53.240 port 45060 ssh2
Oct 11 18:43:52 server sshd\[466\]: User root from 49.232.53.240 not allowed because listed in DenyUsers
Oct 11 18:43:52 server sshd\[466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.53.240  user=root
2019-10-12 13:50:29
82.117.247.58 attackspambots
postfix
2019-10-12 14:06:55
183.131.82.99 attackbotsspam
Oct 12 10:55:47 areeb-Workstation sshd[26267]: Failed password for root from 183.131.82.99 port 62663 ssh2
Oct 12 10:55:50 areeb-Workstation sshd[26267]: Failed password for root from 183.131.82.99 port 62663 ssh2
...
2019-10-12 13:26:57
78.22.89.35 attackspambots
Automatic report - Banned IP Access
2019-10-12 13:41:11
110.168.168.43 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.168.168.43/ 
 TH - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN17552 
 
 IP : 110.168.168.43 
 
 CIDR : 110.168.128.0/18 
 
 PREFIX COUNT : 345 
 
 UNIQUE IP COUNT : 1515264 
 
 
 WYKRYTE ATAKI Z ASN17552 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-10-12 08:04:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-12 14:11:46
104.236.112.52 attack
SSH invalid-user multiple login try
2019-10-12 14:09:36
182.61.40.158 attack
Oct 10 14:44:38 vegas sshd[5244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.158  user=r.r
Oct 10 14:44:41 vegas sshd[5244]: Failed password for r.r from 182.61.40.158 port 47712 ssh2
Oct 10 15:13:19 vegas sshd[10476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.158  user=r.r
Oct 10 15:13:20 vegas sshd[10476]: Failed password for r.r from 182.61.40.158 port 37718 ssh2
Oct 10 15:18:23 vegas sshd[11343]: Invalid user 123 from 182.61.40.158 port 44990
Oct 10 15:18:23 vegas sshd[11343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.158

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.61.40.158
2019-10-12 13:23:54
45.55.12.248 attackspam
Invalid user ftpuser from 45.55.12.248 port 34888
2019-10-12 13:53:41
103.133.110.77 attack
Oct 12 06:41:15 ncomp postfix/smtpd[3961]: warning: unknown[103.133.110.77]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 12 06:41:24 ncomp postfix/smtpd[3961]: warning: unknown[103.133.110.77]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 12 06:41:36 ncomp postfix/smtpd[3961]: warning: unknown[103.133.110.77]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-12 13:51:55
13.72.70.4 attack
Wordpress Bruteforce
2019-10-12 13:46:26

Recently Reported IPs

137.226.7.81 31.31.162.211 172.241.137.102 137.226.144.12
137.226.143.130 206.189.23.38 5.167.68.27 45.55.56.33
13.36.191.201 5.167.69.19 192.241.219.44 45.11.0.48
45.79.126.132 47.205.222.120 20.102.68.120 1.0.158.141
20.89.110.50 52.151.65.193 170.233.193.129 20.219.153.189