Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.14.94.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.14.94.109.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 18:39:13 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 109.94.14.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 109.94.14.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.51.225.210 attack
2020-08-15T12:24:32.359323shield sshd\[18565\]: Invalid user admin from 93.51.225.210 port 55662
2020-08-15T12:24:32.461449shield sshd\[18565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-51-225-210.ip269.fastwebnet.it
2020-08-15T12:24:34.316153shield sshd\[18565\]: Failed password for invalid user admin from 93.51.225.210 port 55662 ssh2
2020-08-15T12:24:35.234167shield sshd\[18575\]: Invalid user admin from 93.51.225.210 port 55750
2020-08-15T12:24:35.336726shield sshd\[18575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-51-225-210.ip269.fastwebnet.it
2020-08-15 21:39:42
49.88.112.111 attackbotsspam
2020-08-15T13:25:11.542354vps1033 sshd[16292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
2020-08-15T13:25:13.295256vps1033 sshd[16292]: Failed password for root from 49.88.112.111 port 25687 ssh2
2020-08-15T13:25:11.542354vps1033 sshd[16292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
2020-08-15T13:25:13.295256vps1033 sshd[16292]: Failed password for root from 49.88.112.111 port 25687 ssh2
2020-08-15T13:25:15.887145vps1033 sshd[16292]: Failed password for root from 49.88.112.111 port 25687 ssh2
...
2020-08-15 21:41:40
46.98.134.139 attackspambots
20/8/15@08:24:28: FAIL: Alarm-Network address from=46.98.134.139
20/8/15@08:24:28: FAIL: Alarm-Network address from=46.98.134.139
...
2020-08-15 21:43:42
222.186.180.223 attackspam
Aug 15 15:28:46 santamaria sshd\[23101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Aug 15 15:28:48 santamaria sshd\[23101\]: Failed password for root from 222.186.180.223 port 62084 ssh2
Aug 15 15:28:51 santamaria sshd\[23101\]: Failed password for root from 222.186.180.223 port 62084 ssh2
...
2020-08-15 21:31:48
77.55.226.212 attackspam
Aug 15 14:16:17 abendstille sshd\[15969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.226.212  user=root
Aug 15 14:16:19 abendstille sshd\[15969\]: Failed password for root from 77.55.226.212 port 52018 ssh2
Aug 15 14:20:00 abendstille sshd\[19487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.226.212  user=root
Aug 15 14:20:02 abendstille sshd\[19487\]: Failed password for root from 77.55.226.212 port 55994 ssh2
Aug 15 14:23:53 abendstille sshd\[23140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.226.212  user=root
...
2020-08-15 22:09:22
179.99.30.192 attack
Lines containing failures of 179.99.30.192 (max 1000)
Aug 12 10:25:43 localhost sshd[8699]: User r.r from 179.99.30.192 not allowed because listed in DenyUsers
Aug 12 10:25:43 localhost sshd[8699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.30.192  user=r.r
Aug 12 10:25:44 localhost sshd[8699]: Failed password for invalid user r.r from 179.99.30.192 port 38148 ssh2
Aug 12 10:25:45 localhost sshd[8699]: Received disconnect from 179.99.30.192 port 38148:11: Bye Bye [preauth]
Aug 12 10:25:45 localhost sshd[8699]: Disconnected from invalid user r.r 179.99.30.192 port 38148 [preauth]
Aug 12 10:46:43 localhost sshd[13172]: User r.r from 179.99.30.192 not allowed because listed in DenyUsers
Aug 12 10:46:43 localhost sshd[13172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.99.30.192  user=r.r
Aug 12 10:46:46 localhost sshd[13172]: Failed password for invalid user r.r from 179.99.3........
------------------------------
2020-08-15 21:53:35
213.248.166.35 attackbots
Automatic report - Banned IP Access
2020-08-15 21:36:40
36.133.98.37 attackspambots
Aug 13 16:43:25 mailrelay sshd[12962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.98.37  user=r.r
Aug 13 16:43:28 mailrelay sshd[12962]: Failed password for r.r from 36.133.98.37 port 54732 ssh2
Aug 13 16:43:28 mailrelay sshd[12962]: Received disconnect from 36.133.98.37 port 54732:11: Bye Bye [preauth]
Aug 13 16:43:28 mailrelay sshd[12962]: Disconnected from 36.133.98.37 port 54732 [preauth]
Aug 13 16:50:28 mailrelay sshd[13083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.98.37  user=r.r
Aug 13 16:50:29 mailrelay sshd[13083]: Failed password for r.r from 36.133.98.37 port 50774 ssh2
Aug 13 16:50:30 mailrelay sshd[13083]: Received disconnect from 36.133.98.37 port 50774:11: Bye Bye [preauth]
Aug 13 16:50:30 mailrelay sshd[13083]: Disconnected from 36.133.98.37 port 50774 [preauth]
Aug 13 16:54:52 mailrelay sshd[13166]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2020-08-15 22:07:11
167.99.239.83 attackspambots
Port 22 Scan, PTR: None
2020-08-15 21:44:48
69.131.62.50 attack
Port 22 Scan, PTR: None
2020-08-15 21:34:23
49.88.112.115 attack
Aug 15 10:24:48 vps46666688 sshd[1543]: Failed password for root from 49.88.112.115 port 49026 ssh2
...
2020-08-15 21:34:57
59.126.36.249 attack
Port Scan detected!
...
2020-08-15 21:53:22
129.227.129.167 attackspambots
 TCP (SYN) 129.227.129.167:41436 -> port 6600, len 44
2020-08-15 21:56:55
62.171.189.221 attack
 TCP (SYN) 62.171.189.221:40117 -> port 81, len 44
2020-08-15 21:47:35
159.65.152.201 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-15 21:48:09

Recently Reported IPs

3.64.247.140 142.93.71.71 204.125.119.44 240.219.158.207
168.131.147.142 213.239.205.184 188.174.155.143 29.74.122.171
0.114.166.3 158.69.225.77 29.194.183.126 233.104.104.217
145.31.176.23 93.158.75.1 213.192.54.62 129.166.178.91
213.192.54.135 18.179.149.109 144.76.84.138 66.163.161.89