Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.94.122.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.94.122.229.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024123101 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 01 10:34:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
229.122.94.1.in-addr.arpa domain name pointer ecs-1-94-122-229.compute.hwclouds-dns.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.122.94.1.in-addr.arpa	name = ecs-1-94-122-229.compute.hwclouds-dns.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.35.176.24 attack
Port scan denied
2020-07-13 23:40:43
165.22.43.225 attackspambots
2020-07-13 12:09:37,188 fail2ban.actions        [937]: NOTICE  [sshd] Ban 165.22.43.225
2020-07-13 12:42:39,516 fail2ban.actions        [937]: NOTICE  [sshd] Ban 165.22.43.225
2020-07-13 13:16:14,604 fail2ban.actions        [937]: NOTICE  [sshd] Ban 165.22.43.225
2020-07-13 13:48:51,177 fail2ban.actions        [937]: NOTICE  [sshd] Ban 165.22.43.225
2020-07-13 14:21:50,338 fail2ban.actions        [937]: NOTICE  [sshd] Ban 165.22.43.225
...
2020-07-13 23:43:39
114.35.219.16 attack
Port scan denied
2020-07-13 23:35:44
106.13.165.208 attackspam
Unauthorized connection attempt detected from IP address 106.13.165.208 to port 11950
2020-07-13 23:18:59
112.167.165.87 attackspambots
Port scan denied
2020-07-13 23:03:51
197.41.28.16 attack
Port scan denied
2020-07-13 23:17:55
218.92.0.208 attackspambots
Jul 13 16:59:25 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
Jul 13 16:59:27 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
Jul 13 16:59:29 server sshd[32710]: Failed password for root from 218.92.0.208 port 47182 ssh2
2020-07-13 23:06:48
78.82.168.146 attackspam
Port scan denied
2020-07-13 23:17:35
159.65.142.103 attack
firewall-block, port(s): 25839/tcp
2020-07-13 23:28:23
139.162.114.154 attackbotsspam
Port scan denied
2020-07-13 23:12:52
192.241.237.238 attackspambots
scans once in preceeding hours on the ports (in chronological order) 8022 resulting in total of 59 scans from 192.241.128.0/17 block.
2020-07-13 23:09:38
140.143.12.119 attack
Port scan denied
2020-07-13 23:39:11
164.132.145.70 attackspambots
Port Scan
...
2020-07-13 23:20:40
193.106.29.75 attackbotsspam
Port scan denied
2020-07-13 23:37:30
113.131.139.22 attack
Port scan denied
2020-07-13 23:08:28

Recently Reported IPs

1.55.146.251 233.79.8.227 1.82.161.53 1.94.168.228
1.92.139.84 1.161.34.226 1.162.148.42 1.162.165.32
1.162.167.80 1.162.167.239 1.162.176.221 1.173.149.145
1.168.177.44 194.217.59.36 1.173.132.97 124.63.230.200
1.4.162.124 2.0.15.142 2.10.26.134 2.5.40.21