Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.80.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.80.136.			IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 02:48:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
136.80.226.137.in-addr.arpa domain name pointer n7k-carl-1-et3-10.noc.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.80.226.137.in-addr.arpa	name = n7k-carl-1-et3-10.noc.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.234.102.1 attack
Fail2Ban Ban Triggered
2019-09-04 23:12:02
117.254.186.98 attackspam
Sep  4 04:48:37 eddieflores sshd\[23020\]: Invalid user smh from 117.254.186.98
Sep  4 04:48:37 eddieflores sshd\[23020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98
Sep  4 04:48:39 eddieflores sshd\[23020\]: Failed password for invalid user smh from 117.254.186.98 port 60036 ssh2
Sep  4 04:55:09 eddieflores sshd\[23627\]: Invalid user shopping from 117.254.186.98
Sep  4 04:55:09 eddieflores sshd\[23627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.186.98
2019-09-04 23:05:55
1.170.240.95 attack
23/tcp
[2019-09-04]1pkt
2019-09-04 23:56:50
190.232.0.206 attackbots
port scan and connect, tcp 23 (telnet)
2019-09-05 00:14:56
153.36.236.35 attackbotsspam
Sep  4 11:28:46 TORMINT sshd\[23753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35  user=root
Sep  4 11:28:47 TORMINT sshd\[23753\]: Failed password for root from 153.36.236.35 port 51381 ssh2
Sep  4 11:28:50 TORMINT sshd\[23753\]: Failed password for root from 153.36.236.35 port 51381 ssh2
...
2019-09-04 23:32:17
218.98.40.142 attack
Sep  4 11:18:20 TORMINT sshd\[23026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.142  user=root
Sep  4 11:18:22 TORMINT sshd\[23026\]: Failed password for root from 218.98.40.142 port 18590 ssh2
Sep  4 11:18:28 TORMINT sshd\[23032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.142  user=root
Sep  4 11:18:30 TORMINT sshd\[23032\]: Failed password for root from 218.98.40.142 port 43044 ssh2
...
2019-09-04 23:27:22
69.24.199.28 attackspambots
445/tcp
[2019-09-04]1pkt
2019-09-04 23:07:46
151.80.144.255 attackbots
Sep  4 05:35:48 kapalua sshd\[3596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-151-80-144.eu  user=root
Sep  4 05:35:50 kapalua sshd\[3596\]: Failed password for root from 151.80.144.255 port 33108 ssh2
Sep  4 05:39:43 kapalua sshd\[4063\]: Invalid user wp from 151.80.144.255
Sep  4 05:39:43 kapalua sshd\[4063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=255.ip-151-80-144.eu
Sep  4 05:39:45 kapalua sshd\[4063\]: Failed password for invalid user wp from 151.80.144.255 port 54689 ssh2
2019-09-04 23:53:03
177.32.64.240 attackbots
Sep  4 18:39:51 server sshd\[21698\]: Invalid user ts from 177.32.64.240 port 15585
Sep  4 18:39:51 server sshd\[21698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.64.240
Sep  4 18:39:53 server sshd\[21698\]: Failed password for invalid user ts from 177.32.64.240 port 15585 ssh2
Sep  4 18:45:38 server sshd\[9900\]: Invalid user dotblot from 177.32.64.240 port 38657
Sep  4 18:45:38 server sshd\[9900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.64.240
2019-09-04 23:45:56
49.234.205.204 attackspambots
2019-09-04T14:43:17.169708abusebot.cloudsearch.cf sshd\[30385\]: Invalid user cloud from 49.234.205.204 port 57414
2019-09-04 23:05:36
60.219.185.202 attack
Fail2Ban - FTP Abuse Attempt
2019-09-05 00:09:38
222.188.29.169 attack
firewall-block, port(s): 22/tcp
2019-09-04 23:21:10
109.207.79.116 attackspam
Sep  4 05:21:23 php1 sshd\[7678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.207.79.116  user=root
Sep  4 05:21:25 php1 sshd\[7678\]: Failed password for root from 109.207.79.116 port 57388 ssh2
Sep  4 05:26:17 php1 sshd\[8096\]: Invalid user ftptest from 109.207.79.116
Sep  4 05:26:17 php1 sshd\[8096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.207.79.116
Sep  4 05:26:19 php1 sshd\[8096\]: Failed password for invalid user ftptest from 109.207.79.116 port 45576 ssh2
2019-09-04 23:37:44
216.243.31.2 attackbots
firewall-block, port(s): 80/tcp
2019-09-04 23:25:05
45.55.15.134 attackbots
2019-09-04T15:08:35.840126abusebot-8.cloudsearch.cf sshd\[20209\]: Invalid user acacia from 45.55.15.134 port 42313
2019-09-04 23:13:04

Recently Reported IPs

169.229.211.18 137.226.80.164 137.226.80.174 137.226.80.212
137.226.113.85 137.226.81.189 137.226.81.92 137.226.81.239
137.226.82.90 137.226.82.196 137.226.83.46 137.226.83.137
137.226.84.47 137.226.83.174 137.226.84.91 137.226.85.42
137.226.85.110 137.226.84.232 137.226.85.236 137.226.117.131