Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.94.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59347
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.94.1.			IN	A

;; AUTHORITY SECTION:
.			352	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061201 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 06:02:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
1.94.226.137.in-addr.arpa domain name pointer isf-n1.isf.rwth-aachen.de.
1.94.226.137.in-addr.arpa domain name pointer isf001.isf.rwth-aachen.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.94.226.137.in-addr.arpa	name = isf-n1.isf.rwth-aachen.de.
1.94.226.137.in-addr.arpa	name = isf001.isf.rwth-aachen.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.188.166.2 attack
Unauthorized connection attempt detected from IP address 202.188.166.2 to port 445
2020-06-22 06:25:15
221.122.68.26 attackspambots
Unauthorized connection attempt detected from IP address 221.122.68.26 to port 1433
2020-06-22 06:39:59
49.51.155.120 attackbotsspam
 UDP 49.51.155.120:49666 -> port 2152, len 40
2020-06-22 06:54:26
79.106.110.98 attackspambots
 TCP (SYN) 79.106.110.98:60180 -> port 23, len 44
2020-06-22 06:51:06
88.247.117.206 attackbots
Unauthorized connection attempt detected from IP address 88.247.117.206 to port 2323
2020-06-22 06:49:28
46.201.233.93 attackspam
Unauthorized connection attempt detected from IP address 46.201.233.93 to port 2323
2020-06-22 06:55:54
23.24.132.13 attackspam
Unauthorized connection attempt detected from IP address 23.24.132.13 to port 23
2020-06-22 06:22:27
98.216.209.45 attack
Unauthorized connection attempt detected from IP address 98.216.209.45 to port 80
2020-06-22 06:49:08
170.106.67.19 attackbots
Unauthorized connection attempt detected from IP address 170.106.67.19 to port 2160
2020-06-22 06:44:45
103.48.50.134 attack
Unauthorized connection attempt detected from IP address 103.48.50.134 to port 445
2020-06-22 06:48:48
49.51.160.47 attack
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 1433
2020-06-22 06:37:44
83.174.32.100 attack
Unauthorized connection attempt detected from IP address 83.174.32.100 to port 2323
2020-06-22 06:49:59
184.67.105.182 attackbots
716. On Jun 21 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 184.67.105.182.
2020-06-22 06:26:57
60.191.125.35 attackbotsspam
Unauthorized connection attempt detected from IP address 60.191.125.35 to port 8908
2020-06-22 06:53:04
176.42.84.218 attackbots
Unauthorized connection attempt detected from IP address 176.42.84.218 to port 23
2020-06-22 06:28:41

Recently Reported IPs

137.226.92.223 137.226.92.245 137.226.94.148 137.226.94.51
137.226.95.18 137.226.94.177 137.226.123.134 137.226.133.193
137.226.124.166 137.226.124.87 137.226.131.103 137.226.131.250
137.226.131.19 137.226.133.151 137.226.123.175 137.226.134.22
137.226.134.215 137.226.130.195 137.226.132.35 137.226.136.100