Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.80.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.80.21.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 23:53:17 CST 2022
;; MSG SIZE  rcvd: 106
Host info
21.80.226.137.in-addr.arpa domain name pointer hm-karman-4.zhv.rwth-aachen.de.
21.80.226.137.in-addr.arpa domain name pointer hm-karman-2.zhv.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.80.226.137.in-addr.arpa	name = hm-karman-4.zhv.rwth-aachen.de.
21.80.226.137.in-addr.arpa	name = hm-karman-2.zhv.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.48.116.50 attack
Jun 26 02:10:11 ip-172-31-1-72 sshd\[4090\]: Invalid user dev from 181.48.116.50
Jun 26 02:10:11 ip-172-31-1-72 sshd\[4090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.116.50
Jun 26 02:10:12 ip-172-31-1-72 sshd\[4090\]: Failed password for invalid user dev from 181.48.116.50 port 38446 ssh2
Jun 26 02:12:24 ip-172-31-1-72 sshd\[4135\]: Invalid user nmwangi from 181.48.116.50
Jun 26 02:12:24 ip-172-31-1-72 sshd\[4135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.116.50
2019-06-26 10:21:25
159.224.226.164 attack
Brute force SMTP login attempts.
2019-06-26 10:25:15
216.222.194.162 attackspambots
Brute force attempt
2019-06-26 10:41:40
139.59.25.252 attackspambots
Jun 26 09:08:42 itv-usvr-02 sshd[32355]: Invalid user system from 139.59.25.252 port 57168
Jun 26 09:08:42 itv-usvr-02 sshd[32355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.25.252
Jun 26 09:08:42 itv-usvr-02 sshd[32355]: Invalid user system from 139.59.25.252 port 57168
Jun 26 09:08:44 itv-usvr-02 sshd[32355]: Failed password for invalid user system from 139.59.25.252 port 57168 ssh2
Jun 26 09:10:47 itv-usvr-02 sshd[32450]: Invalid user lucas from 139.59.25.252 port 48880
2019-06-26 10:48:59
191.194.96.226 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-26 10:37:17
190.28.68.12 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-26 10:38:47
220.247.175.58 attackbots
Jun 26 03:25:19 debian sshd\[17757\]: Invalid user owen from 220.247.175.58 port 50953
Jun 26 03:25:19 debian sshd\[17757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.175.58
...
2019-06-26 10:52:59
168.194.140.130 attackbotsspam
Jun 25 19:30:29 atlassian sshd[21594]: Invalid user www from 168.194.140.130 port 51078
Jun 25 19:30:29 atlassian sshd[21594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.140.130
Jun 25 19:30:29 atlassian sshd[21594]: Invalid user www from 168.194.140.130 port 51078
Jun 25 19:30:30 atlassian sshd[21594]: Failed password for invalid user www from 168.194.140.130 port 51078 ssh2
2019-06-26 10:12:21
82.221.105.6 attack
26.06.2019 02:11:23 Connection to port 2152 blocked by firewall
2019-06-26 10:32:38
91.213.125.2 attackspam
[portscan] Port scan
2019-06-26 10:46:14
185.208.208.144 attack
firewall-block, port(s): 9090/tcp
2019-06-26 10:53:28
54.240.11.146 attackspam
IP: 54.240.11.146
ASN: AS14618  Amazon.com Inc.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 26/06/2019 2:11:15 AM UTC
2019-06-26 10:36:29
146.88.240.4 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-26 10:55:25
111.223.73.130 attackbotsspam
Port Scan 3389
2019-06-26 10:47:04
93.138.102.152 attack
Unauthorized connection attempt from IP address 93.138.102.152 on Port 445(SMB)
2019-06-26 10:22:09

Recently Reported IPs

137.226.79.231 137.226.80.13 137.226.80.22 137.226.80.27
137.226.80.36 137.226.80.47 137.226.80.43 137.226.68.168
216.151.130.108 216.152.249.73 137.226.115.145 216.152.249.170
216.151.137.111 177.239.50.168 216.152.252.79 216.152.249.230
137.226.63.254 216.151.137.245 123.56.175.31 137.226.68.18