Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.86.114.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.86.114.94.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:12:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
94.114.86.118.in-addr.arpa domain name pointer 118-86-114-94.kakt.j-cnet.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.114.86.118.in-addr.arpa	name = 118-86-114-94.kakt.j-cnet.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.102.51.29 attackbots
firewall-block, port(s): 3392/tcp, 5000/tcp
2020-05-12 08:30:28
51.255.109.171 attackspambots
GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak
2020-05-12 08:49:02
51.89.68.142 attack
$f2bV_matches
2020-05-12 12:11:59
80.82.69.130 attackspam
Multiport scan : 21 ports scanned 25018 25020 25033 25046 25050 25054 25059 25077 25081 25085 25088 25092 25100 25104 25111 25121 25127 25149 25166 25176 25190
2020-05-12 08:41:28
89.248.168.218 attackbots
05/11/2020-20:25:57.256845 89.248.168.218 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-12 08:36:28
138.121.170.194 attackbotsspam
2020-05-12T04:06:31.097175shield sshd\[15701\]: Invalid user karla from 138.121.170.194 port 49698
2020-05-12T04:06:31.101569shield sshd\[15701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.170.194.dnsgigas.es
2020-05-12T04:06:33.043231shield sshd\[15701\]: Failed password for invalid user karla from 138.121.170.194 port 49698 ssh2
2020-05-12T04:10:10.955584shield sshd\[16696\]: Invalid user majordomo1 from 138.121.170.194 port 48886
2020-05-12T04:10:10.959034shield sshd\[16696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.170.194.dnsgigas.es
2020-05-12 12:10:49
61.177.172.128 attack
2020-05-12T06:59:11.924404afi-git.jinr.ru sshd[7035]: Failed password for root from 61.177.172.128 port 6841 ssh2
2020-05-12T06:59:14.640804afi-git.jinr.ru sshd[7035]: Failed password for root from 61.177.172.128 port 6841 ssh2
2020-05-12T06:59:17.636170afi-git.jinr.ru sshd[7035]: Failed password for root from 61.177.172.128 port 6841 ssh2
2020-05-12T06:59:17.636346afi-git.jinr.ru sshd[7035]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 6841 ssh2 [preauth]
2020-05-12T06:59:17.636361afi-git.jinr.ru sshd[7035]: Disconnecting: Too many authentication failures [preauth]
...
2020-05-12 12:04:42
80.82.78.100 attack
port
2020-05-12 08:39:17
51.91.212.79 attack
Multiport scan : 12 ports scanned 110 465 989 2049 2376 5432 5984 6008 6010 6379 10161 10162
2020-05-12 08:50:55
51.91.212.81 attackbots
Port scan on 5 port(s): 111 749 6008 8010 9050
2020-05-12 08:50:14
51.75.161.33 attackspambots
Multiport scan 33 ports : 848 2046 2933 3133 3924 4566 4782 7477 7746 9124 9483 11678 13204 14440 17554 17964 18582 18908 19930 22053 25556 25575 25640 26402 27204 27404 28913 29477 29903 30365 30818 30905 32699
2020-05-12 08:51:42
185.176.27.246 attack
05/11/2020-23:55:38.064214 185.176.27.246 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-12 12:01:14
190.145.12.58 attackbotsspam
May 12 05:55:35 debian-2gb-nbg1-2 kernel: \[11514599.863924\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=190.145.12.58 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=44 ID=53188 PROTO=TCP SPT=31999 DPT=8089 WINDOW=25362 RES=0x00 SYN URGP=0
2020-05-12 12:02:00
58.63.245.235 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-05-12 08:48:39
94.102.56.215 attackspam
Multiport scan 62 ports : 1(x5) 520(x5) 922(x5) 1034(x4) 1037(x5) 1043(x5) 1048(x4) 1049(x5) 1056(x5) 1058(x4) 1065(x5) 1083(x5) 1285(x5) 1287(x5) 1543(x4) 1796(x4) 1797(x4) 1813(x4) 2049(x4) 2152(x4) 2223(x4) 2309(x4) 2311(x4) 2565(x4) 3703(x4) 4070(x4) 4099(x4) 4353(x4) 5889(x4) 6881(x4) 6889(x4) 6981(x4) 7623(x4) 7659(x4) 7748(x4) 7760(x4) 7791(x4) 7794(x4) 7803(x4) 7805(x3) 7822(x4) 7842(x4) 7876(x4) 7941(x4) 7958(x4) 7961(x4) 8998(x4) 9728(x3) 10009(x4) 10285(x4) 10633(x4) 11265(x4) 16464(x4) 18011(x4) 21234(x4) 24265(x4) 24292(x3) 27016(x4) 28007(x4) 28008(x4) 28025(x4) 28070(x4)
2020-05-12 08:30:11

Recently Reported IPs

238.125.152.42 188.81.75.243 101.239.17.130 217.90.131.185
198.241.241.176 168.62.104.114 2.49.200.80 217.149.105.36
150.194.75.207 161.7.169.20 105.248.85.224 140.147.110.182
155.245.153.212 147.219.230.76 17.202.75.114 3.36.158.194
146.130.156.223 163.184.62.157 176.247.64.140 184.168.76.50