Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.9.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.9.164.			IN	A

;; AUTHORITY SECTION:
.			290	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 09:55:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 164.9.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.9.226.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.157.192.132 attack
Fail2Ban Ban Triggered
2020-05-28 14:23:19
178.33.45.54 attack
Automatic report - XMLRPC Attack
2020-05-28 14:05:52
49.234.98.155 attackspambots
2020-05-28 00:05:34.112750-0500  localhost sshd[61014]: Failed password for invalid user rowen from 49.234.98.155 port 37120 ssh2
2020-05-28 14:36:01
106.13.144.8 attack
May 28 02:03:39 firewall sshd[8836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8  user=root
May 28 02:03:41 firewall sshd[8836]: Failed password for root from 106.13.144.8 port 41600 ssh2
May 28 02:07:54 firewall sshd[8961]: Invalid user test from 106.13.144.8
...
2020-05-28 14:10:02
123.50.74.246 attackspam
SSH login attempts.
2020-05-28 14:28:01
84.17.59.70 attack
(smtpauth) Failed SMTP AUTH login from 84.17.59.70 (IT/Italy/unn-84-17-59-70.cdn77.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-28 08:43:48 login authenticator failed for (LCIKLEBV) [84.17.59.70]: 535 Incorrect authentication data (set_id=saghebfar@safanicu.com)
2020-05-28 14:11:28
120.132.11.186 attackspam
2020-05-28T05:59:01.983376shield sshd\[3439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.11.186  user=root
2020-05-28T05:59:03.345223shield sshd\[3439\]: Failed password for root from 120.132.11.186 port 45520 ssh2
2020-05-28T06:02:55.056126shield sshd\[4192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.11.186  user=root
2020-05-28T06:02:56.543246shield sshd\[4192\]: Failed password for root from 120.132.11.186 port 58584 ssh2
2020-05-28T06:06:44.154483shield sshd\[4905\]: Invalid user atscale from 120.132.11.186 port 43414
2020-05-28 14:20:51
114.67.67.41 attack
ssh brute force
2020-05-28 14:15:39
113.253.217.222 attackspam
Icarus honeypot on github
2020-05-28 14:34:49
77.94.124.138 attackspambots
$f2bV_matches
2020-05-28 14:08:58
74.200.6.147 attack
May 27 05:08:57 xxx sshd[23076]: Failed password for r.r from 74.200.6.147 port 57826 ssh2
May 27 05:08:57 xxx sshd[23076]: Received disconnect from 74.200.6.147 port 57826:11: Bye Bye [preauth]
May 27 05:08:57 xxx sshd[23076]: Disconnected from 74.200.6.147 port 57826 [preauth]
May 27 05:16:28 xxx sshd[25111]: Failed password for r.r from 74.200.6.147 port 48372 ssh2
May 27 05:16:28 xxx sshd[25111]: Received disconnect from 74.200.6.147 port 48372:11: Bye Bye [preauth]
May 27 05:16:28 xxx sshd[25111]: Disconnected from 74.200.6.147 port 48372 [preauth]
May 27 05:20:31 xxx sshd[26040]: Invalid user liezzi from 74.200.6.147 port 33176
May 27 05:20:31 xxx sshd[26040]: Failed password for invalid user liezzi from 74.200.6.147 port 33176 ssh2
May 27 05:20:31 xxx sshd[26040]: Received disconnect from 74.200.6.147 port 33176:11: Bye Bye [preauth]
May 27 05:20:31 xxx sshd[26040]: Disconnected from 74.200.6.147 port 33176 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en
2020-05-28 14:12:40
112.85.42.172 attack
2020-05-28T09:30:37.657079afi-git.jinr.ru sshd[26776]: Failed password for root from 112.85.42.172 port 14641 ssh2
2020-05-28T09:30:41.334778afi-git.jinr.ru sshd[26776]: Failed password for root from 112.85.42.172 port 14641 ssh2
2020-05-28T09:30:44.753796afi-git.jinr.ru sshd[26776]: Failed password for root from 112.85.42.172 port 14641 ssh2
2020-05-28T09:30:44.753961afi-git.jinr.ru sshd[26776]: error: maximum authentication attempts exceeded for root from 112.85.42.172 port 14641 ssh2 [preauth]
2020-05-28T09:30:44.753976afi-git.jinr.ru sshd[26776]: Disconnecting: Too many authentication failures [preauth]
...
2020-05-28 14:35:14
212.129.27.121 attackspam
$f2bV_matches
2020-05-28 14:02:02
175.24.132.222 attack
May 28 08:02:21 eventyay sshd[27772]: Failed password for root from 175.24.132.222 port 35900 ssh2
May 28 08:06:13 eventyay sshd[27956]: Failed password for root from 175.24.132.222 port 58554 ssh2
...
2020-05-28 14:16:58
139.99.43.235 attack
Invalid user teamspeak from 139.99.43.235 port 53494
2020-05-28 14:36:45

Recently Reported IPs

119.12.123.189 137.226.0.113 177.229.210.66 181.225.253.47
169.229.0.164 137.226.9.77 43.154.90.33 64.119.29.148
20.68.121.188 137.226.7.54 137.226.7.69 212.225.188.192
137.226.7.140 137.226.8.122 143.198.142.181 129.226.225.131
137.226.9.81 137.226.21.51 137.226.113.138 169.229.99.76