Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.94.245.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.94.245.212.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 23:23:26 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 212.245.94.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.245.94.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.172.121.195 attack
scan r
2020-03-12 01:14:45
125.24.253.53 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-03-12 01:35:11
62.171.139.59 attack
Mar 11 18:05:41 vps670341 sshd[18424]: Invalid user r00t from 62.171.139.59 port 52840
2020-03-12 01:36:08
5.238.65.163 attackspambots
Mar 11 11:36:59 mxgate1 postfix/postscreen[7365]: CONNECT from [5.238.65.163]:53076 to [176.31.12.44]:25
Mar 11 11:36:59 mxgate1 postfix/dnsblog[7367]: addr 5.238.65.163 listed by domain zen.spamhaus.org as 127.0.0.4
Mar 11 11:36:59 mxgate1 postfix/dnsblog[7367]: addr 5.238.65.163 listed by domain zen.spamhaus.org as 127.0.0.11
Mar 11 11:36:59 mxgate1 postfix/dnsblog[7366]: addr 5.238.65.163 listed by domain cbl.abuseat.org as 127.0.0.2
Mar 11 11:36:59 mxgate1 postfix/dnsblog[7370]: addr 5.238.65.163 listed by domain b.barracudacentral.org as 127.0.0.2
Mar 11 11:37:00 mxgate1 postfix/postscreen[7365]: PREGREET 13 after 0.62 from [5.238.65.163]:53076: HELO me.com

Mar 11 11:37:00 mxgate1 postfix/postscreen[7365]: DNSBL rank 4 for [5.238.65.163]:53076
Mar x@x
Mar 11 11:37:02 mxgate1 postfix/postscreen[7365]: HANGUP after 2.1 from [5.238.65.163]:53076 in tests after SMTP handshake
Mar 11 11:37:02 mxgate1 postfix/postscreen[7365]: DISCONNECT [5.238.65.163]:53076


........
----------------------------------------
2020-03-12 01:29:58
87.255.211.73 attack
Brute force attempt
2020-03-12 01:56:56
211.72.117.101 attackspam
Mar 11 18:27:54  sshd\[19779\]: User root from 211-72-117-101.hinet-ip.hinet.net not allowed because not listed in AllowUsersMar 11 18:27:56  sshd\[19779\]: Failed password for invalid user root from 211.72.117.101 port 54860 ssh2
...
2020-03-12 01:57:39
146.185.141.95 attackbotsspam
Invalid user ubuntu from 146.185.141.95 port 36782
2020-03-12 01:53:04
36.79.188.112 attack
Mar 11 10:38:24 netserv300 sshd[29010]: Connection from 36.79.188.112 port 60943 on 178.63.236.16 port 22
Mar 11 10:38:24 netserv300 sshd[29011]: Connection from 36.79.188.112 port 60978 on 178.63.236.21 port 22
Mar 11 10:38:24 netserv300 sshd[29012]: Connection from 36.79.188.112 port 60957 on 178.63.236.22 port 22
Mar 11 10:38:24 netserv300 sshd[29013]: Connection from 36.79.188.112 port 60985 on 178.63.236.20 port 22
Mar 11 10:38:24 netserv300 sshd[29014]: Connection from 36.79.188.112 port 60974 on 178.63.236.19 port 22
Mar 11 10:38:24 netserv300 sshd[29016]: Connection from 36.79.188.112 port 60975 on 178.63.236.18 port 22
Mar 11 10:38:24 netserv300 sshd[29015]: Connection from 36.79.188.112 port 60968 on 178.63.236.17 port 22
Mar 11 10:38:28 netserv300 sshd[29017]: Connection from 36.79.188.112 port 60614 on 178.63.236.22 port 22
Mar 11 10:38:28 netserv300 sshd[29018]: Connection from 36.79.188.112 port 60836 on 178.63.236.16 port 22
Mar 11 10:38:28 netserv300 sshd........
------------------------------
2020-03-12 01:52:01
191.243.40.44 attackspambots
1583923310 - 03/11/2020 17:41:50 Host: 44.40.243.191.in-addr.arpa/191.243.40.44 Port: 23 TCP Blocked
...
2020-03-12 01:22:31
178.62.75.60 attackspam
Mar 11 16:16:19 ovpn sshd\[17003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60  user=root
Mar 11 16:16:20 ovpn sshd\[17003\]: Failed password for root from 178.62.75.60 port 47364 ssh2
Mar 11 16:25:12 ovpn sshd\[3941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60  user=root
Mar 11 16:25:14 ovpn sshd\[3941\]: Failed password for root from 178.62.75.60 port 59236 ssh2
Mar 11 16:31:45 ovpn sshd\[5494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60  user=root
2020-03-12 01:34:50
61.28.108.122 attack
SSH login attempts.
2020-03-12 01:48:49
111.231.239.143 attack
Invalid user piotr from 111.231.239.143 port 36954
2020-03-12 01:35:38
178.74.102.1 attackbotsspam
20/3/11@10:12:41: FAIL: Alarm-Network address from=178.74.102.1
20/3/11@10:12:41: FAIL: Alarm-Network address from=178.74.102.1
...
2020-03-12 01:29:05
14.37.10.144 attack
port scan and connect, tcp 23 (telnet)
2020-03-12 01:55:13
171.237.134.255 attackspam
$f2bV_matches
2020-03-12 01:19:54

Recently Reported IPs

117.94.245.24 117.94.245.63 117.94.245.58 117.94.245.246
117.94.245.65 117.94.245.97 117.94.245.80 114.235.23.170
117.94.245.56 117.94.245.50 117.94.245.73 117.94.28.102
117.94.28.116 117.94.28.118 117.94.28.11 117.94.245.85
117.94.28.115 117.94.28.12 117.94.28.106 117.94.28.121