Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.94.98.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.94.98.20.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 13:34:55 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 20.98.94.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.98.94.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.9.70.117 attack
20 attempts against mh-misbehave-ban on lake
2020-10-02 17:21:09
125.43.69.155 attack
SSH login attempts.
2020-10-02 17:03:32
1.235.192.218 attackspambots
Oct  2 10:28:48 Server sshd[124807]: Invalid user zk from 1.235.192.218 port 57426
Oct  2 10:28:48 Server sshd[124807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.192.218 
Oct  2 10:28:48 Server sshd[124807]: Invalid user zk from 1.235.192.218 port 57426
Oct  2 10:28:50 Server sshd[124807]: Failed password for invalid user zk from 1.235.192.218 port 57426 ssh2
Oct  2 10:30:48 Server sshd[125715]: Invalid user eagle from 1.235.192.218 port 33726
...
2020-10-02 16:58:38
106.12.70.112 attackbots
firewall-block, port(s): 12834/tcp
2020-10-02 16:52:24
212.70.149.83 attackspam
2020-10-02 12:15:13 auth_plain authenticator failed for (User) [212.70.149.83]: 535 Incorrect authentication data (set_id=ab@com.ua)
2020-10-02 12:15:39 auth_plain authenticator failed for (User) [212.70.149.83]: 535 Incorrect authentication data (set_id=dns03@com.ua)
...
2020-10-02 17:17:44
124.70.66.245 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-02 16:56:27
46.105.31.249 attack
Invalid user apache2 from 46.105.31.249 port 45928
2020-10-02 16:57:03
115.73.222.9 attack
IP 115.73.222.9 attacked honeypot on port: 3389 at 10/1/2020 1:40:09 PM
2020-10-02 17:05:22
2.57.122.116 attackbotsspam
 TCP (SYN) 2.57.122.116:47611 -> port 22, len 44
2020-10-02 16:59:22
203.213.66.170 attackspambots
SSH brute-force attempt
2020-10-02 17:10:04
122.96.140.194 attack
Found on   Alienvault    / proto=6  .  srcport=4874  .  dstport=1433  .     (3838)
2020-10-02 17:22:11
183.134.65.197 attack
" "
2020-10-02 17:02:37
104.206.128.6 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-02 17:08:30
111.230.29.17 attackbots
Oct  2 10:55:59 vm0 sshd[4286]: Failed password for root from 111.230.29.17 port 55516 ssh2
...
2020-10-02 17:14:08
213.39.55.13 attackbotsspam
SSH login attempts.
2020-10-02 16:57:36

Recently Reported IPs

112.94.98.201 112.94.97.37 112.94.98.212 112.94.98.188
112.94.98.229 112.94.98.222 112.94.98.48 112.94.98.35
112.94.98.36 112.94.98.9 112.94.99.11 112.94.98.98
112.94.98.250 112.94.98.94 112.94.98.89 112.94.98.237
112.94.99.140 112.94.99.145 112.94.99.122 112.94.99.161