Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.94.142.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.94.142.137.			IN	A

;; AUTHORITY SECTION:
.			368	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031101 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 05:27:45 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 137.142.94.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 137.142.94.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
144.217.241.40 attack
Aug 25 00:36:51 work-partkepr sshd\[28579\]: Invalid user uftp from 144.217.241.40 port 55240
Aug 25 00:36:51 work-partkepr sshd\[28579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.241.40
...
2019-08-25 10:57:46
41.223.58.67 attackspambots
Aug 24 23:42:03 [munged] sshd[23257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.58.67  user=root
Aug 24 23:42:05 [munged] sshd[23257]: Failed password for root from 41.223.58.67 port 15380 ssh2
2019-08-25 11:11:21
137.74.119.50 attack
Automatic report - Banned IP Access
2019-08-25 10:51:44
206.81.24.126 attackbotsspam
Aug 24 19:47:44 plusreed sshd[4228]: Invalid user bl from 206.81.24.126
...
2019-08-25 11:18:32
177.137.205.150 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-25 11:24:27
117.221.70.6 attackbots
DATE:2019-08-25 05:25:30,IP:117.221.70.6,MATCHES:11,PORT:ssh
2019-08-25 11:30:42
201.149.22.37 attackbotsspam
Aug 24 12:46:07 lcdev sshd\[30248\]: Invalid user test from 201.149.22.37
Aug 24 12:46:07 lcdev sshd\[30248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37
Aug 24 12:46:09 lcdev sshd\[30248\]: Failed password for invalid user test from 201.149.22.37 port 53170 ssh2
Aug 24 12:50:26 lcdev sshd\[30636\]: Invalid user him from 201.149.22.37
Aug 24 12:50:26 lcdev sshd\[30636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.22.37
2019-08-25 11:07:32
193.105.134.95 attackspambots
Unauthorized SSH connection attempt
2019-08-25 11:19:59
91.121.102.44 attackbots
DATE:2019-08-25 00:31:34,IP:91.121.102.44,MATCHES:11,PORT:ssh
2019-08-25 11:37:10
103.17.159.54 attack
Aug 25 02:40:53 MK-Soft-VM4 sshd\[12003\]: Invalid user administracion from 103.17.159.54 port 49710
Aug 25 02:40:53 MK-Soft-VM4 sshd\[12003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.159.54
Aug 25 02:40:55 MK-Soft-VM4 sshd\[12003\]: Failed password for invalid user administracion from 103.17.159.54 port 49710 ssh2
...
2019-08-25 11:00:55
103.75.103.211 attackspam
Aug 24 14:44:00 hanapaa sshd\[26257\]: Invalid user graylog from 103.75.103.211
Aug 24 14:44:00 hanapaa sshd\[26257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
Aug 24 14:44:02 hanapaa sshd\[26257\]: Failed password for invalid user graylog from 103.75.103.211 port 38108 ssh2
Aug 24 14:48:49 hanapaa sshd\[26721\]: Invalid user flume123 from 103.75.103.211
Aug 24 14:48:49 hanapaa sshd\[26721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211
2019-08-25 11:00:09
109.244.96.201 attack
Aug 25 05:21:32 lnxmail61 sshd[19633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.244.96.201
2019-08-25 11:35:15
82.200.121.251 attackbotsspam
Automatic report - Banned IP Access
2019-08-25 11:38:15
23.94.187.130 attackspam
[munged]::443 23.94.187.130 - - [25/Aug/2019:03:56:22 +0200] "POST /[munged]: HTTP/1.1" 200 6322 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 23.94.187.130 - - [25/Aug/2019:03:56:28 +0200] "POST /[munged]: HTTP/1.1" 200 6295 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-25 10:53:24
147.135.210.187 attack
Aug 25 04:03:43 dev0-dcfr-rnet sshd[17395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.210.187
Aug 25 04:03:46 dev0-dcfr-rnet sshd[17395]: Failed password for invalid user mc from 147.135.210.187 port 57094 ssh2
Aug 25 04:07:46 dev0-dcfr-rnet sshd[17409]: Failed password for root from 147.135.210.187 port 44640 ssh2
2019-08-25 11:25:33

Recently Reported IPs

117.94.142.132 117.94.142.14 117.94.142.140 117.94.142.149
117.94.142.152 117.94.142.156 117.94.142.160 117.94.142.163
117.94.142.164 238.97.237.59 180.248.37.60 117.94.142.17
117.94.142.170 117.94.142.172 117.94.142.174 117.94.142.176
117.94.142.178 117.94.142.180 142.27.17.144 106.64.180.33