Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Zürich

Region: Zurich

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.156.102.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.156.102.137.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025040200 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 02 15:31:11 CST 2025
;; MSG SIZE  rcvd: 108
Host info
137.102.156.194.in-addr.arpa domain name pointer 48481.ip-ptr.tech.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.102.156.194.in-addr.arpa	name = 48481.ip-ptr.tech.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.15.230 attackbotsspam
Aug  2 17:01:00 plusreed sshd[20421]: Invalid user passwd from 106.12.15.230
...
2019-08-03 08:09:59
111.246.149.44 attack
Aug  2 13:09:00 localhost kernel: [16009933.525381] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=111.246.149.44 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=55415 PROTO=TCP SPT=45820 DPT=37215 WINDOW=37592 RES=0x00 SYN URGP=0 
Aug  2 13:09:00 localhost kernel: [16009933.525404] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=111.246.149.44 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=55415 PROTO=TCP SPT=45820 DPT=37215 SEQ=758669438 ACK=0 WINDOW=37592 RES=0x00 SYN URGP=0 
Aug  2 15:24:18 localhost kernel: [16018051.703941] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=111.246.149.44 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=30463 PROTO=TCP SPT=45820 DPT=37215 WINDOW=37592 RES=0x00 SYN URGP=0 
Aug  2 15:24:18 localhost kernel: [16018051.703972] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=111.246.149.44 DST=[mungedIP2] LEN=40 TOS
2019-08-03 08:08:36
62.4.23.104 attack
Aug  3 02:54:39 hosting sshd[5086]: Invalid user testtest from 62.4.23.104 port 56694
...
2019-08-03 08:13:33
23.129.64.165 attackbots
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-08-03 08:49:51
177.101.255.26 attackbotsspam
Aug  2 21:01:49 mail sshd\[30604\]: Failed password for invalid user uno85 from 177.101.255.26 port 46206 ssh2
Aug  2 21:18:23 mail sshd\[30862\]: Invalid user rocco from 177.101.255.26 port 40168
...
2019-08-03 08:52:00
134.209.174.76 attackspambots
ZTE Router Exploit Scanner
2019-08-03 08:12:41
59.36.132.222 attackspam
400 BAD REQUEST
2019-08-03 08:26:46
218.92.0.201 attackspambots
Aug  2 23:44:51 MK-Soft-VM4 sshd\[3715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=root
Aug  2 23:44:53 MK-Soft-VM4 sshd\[3715\]: Failed password for root from 218.92.0.201 port 20240 ssh2
Aug  2 23:44:55 MK-Soft-VM4 sshd\[3715\]: Failed password for root from 218.92.0.201 port 20240 ssh2
...
2019-08-03 08:16:50
42.2.73.146 attack
5555/tcp
[2019-08-02]1pkt
2019-08-03 08:43:04
77.247.110.222 attackbots
SIPVicious Scanner Detection, PTR: PTR record not found
2019-08-03 08:12:56
37.49.231.105 attackbotsspam
08/02/2019-18:50:31.384951 37.49.231.105 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 27
2019-08-03 08:11:15
46.72.31.33 attackspambots
23/tcp
[2019-08-02]1pkt
2019-08-03 08:20:39
190.246.175.156 attackbots
Automatic report - Banned IP Access
2019-08-03 08:21:08
217.169.208.70 attackspam
445/tcp
[2019-08-02]1pkt
2019-08-03 08:50:18
177.158.84.124 attackspambots
Automatic report - Port Scan Attack
2019-08-03 08:33:43

Recently Reported IPs

20.221.67.127 147.185.132.186 113.141.94.44 113.141.89.52
113.141.87.161 113.141.84.160 112.166.161.141 106.179.37.120
207.51.54.4 252.239.54.129 74.189.160.64 1.92.148.235
96.1.160.62 120.46.76.213 221.234.20.33 217.251.82.109
153.255.84.231 133.1.204.83 109.216.34.28 104.234.115.217