Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.90.148.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.90.148.94.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:45:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 94.148.90.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.90.148.94.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.190.14 attack
Apr 18 07:19:50 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
Apr 18 07:19:53 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
Apr 18 07:19:55 minden010 sshd[12256]: Failed password for root from 222.186.190.14 port 45250 ssh2
...
2020-04-18 13:36:23
190.80.13.3 attack
Port probing on unauthorized port 1433
2020-04-18 12:56:11
49.233.90.200 attackbotsspam
Apr 18 05:57:14 santamaria sshd\[17267\]: Invalid user testguy from 49.233.90.200
Apr 18 05:57:14 santamaria sshd\[17267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200
Apr 18 05:57:17 santamaria sshd\[17267\]: Failed password for invalid user testguy from 49.233.90.200 port 43548 ssh2
...
2020-04-18 12:58:56
106.13.73.210 attack
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:35 tuxlinux sshd[22312]: Failed password for invalid user mx from 106.13.73.210 port 60924 ssh2
...
2020-04-18 13:35:55
106.12.90.141 attack
Apr 18 06:23:15 srv01 sshd[23490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.141  user=root
Apr 18 06:23:17 srv01 sshd[23490]: Failed password for root from 106.12.90.141 port 44214 ssh2
Apr 18 06:25:13 srv01 sshd[25271]: Invalid user zabbix from 106.12.90.141 port 40020
Apr 18 06:25:13 srv01 sshd[25271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.141
Apr 18 06:25:13 srv01 sshd[25271]: Invalid user zabbix from 106.12.90.141 port 40020
Apr 18 06:25:15 srv01 sshd[25271]: Failed password for invalid user zabbix from 106.12.90.141 port 40020 ssh2
...
2020-04-18 13:31:11
213.176.35.110 attackbots
Apr 18 07:14:00 [host] sshd[22480]: pam_unix(sshd:
Apr 18 07:14:02 [host] sshd[22480]: Failed passwor
Apr 18 07:17:54 [host] sshd[22556]: pam_unix(sshd:
2020-04-18 13:27:28
77.68.87.72 attackbots
Apr 18 02:15:04 ws24vmsma01 sshd[225134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.68.87.72
Apr 18 02:15:06 ws24vmsma01 sshd[225134]: Failed password for invalid user ao from 77.68.87.72 port 46131 ssh2
...
2020-04-18 13:36:43
34.69.115.56 attackspam
(sshd) Failed SSH login from 34.69.115.56 (US/United States/56.115.69.34.bc.googleusercontent.com): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 18 04:00:32 andromeda sshd[23717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.115.56  user=root
Apr 18 04:00:34 andromeda sshd[23717]: Failed password for root from 34.69.115.56 port 44484 ssh2
Apr 18 04:08:12 andromeda sshd[24074]: Invalid user admin1 from 34.69.115.56 port 54674
2020-04-18 13:06:13
219.250.188.41 attackspam
Apr 18 05:47:14 ns392434 sshd[17980]: Invalid user postgres from 219.250.188.41 port 54984
Apr 18 05:47:14 ns392434 sshd[17980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.41
Apr 18 05:47:14 ns392434 sshd[17980]: Invalid user postgres from 219.250.188.41 port 54984
Apr 18 05:47:16 ns392434 sshd[17980]: Failed password for invalid user postgres from 219.250.188.41 port 54984 ssh2
Apr 18 05:53:44 ns392434 sshd[18186]: Invalid user qm from 219.250.188.41 port 45682
Apr 18 05:53:44 ns392434 sshd[18186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.41
Apr 18 05:53:44 ns392434 sshd[18186]: Invalid user qm from 219.250.188.41 port 45682
Apr 18 05:53:45 ns392434 sshd[18186]: Failed password for invalid user qm from 219.250.188.41 port 45682 ssh2
Apr 18 05:56:46 ns392434 sshd[18307]: Invalid user admin from 219.250.188.41 port 50634
2020-04-18 13:28:46
119.29.119.151 attackbotsspam
Bruteforce detected by fail2ban
2020-04-18 13:20:42
43.226.34.148 attackbotsspam
Apr 18 06:27:54 vps sshd[98691]: Failed password for root from 43.226.34.148 port 38794 ssh2
Apr 18 06:30:21 vps sshd[113951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.34.148  user=root
Apr 18 06:30:23 vps sshd[113951]: Failed password for root from 43.226.34.148 port 34990 ssh2
Apr 18 06:32:39 vps sshd[123593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.34.148  user=root
Apr 18 06:32:41 vps sshd[123593]: Failed password for root from 43.226.34.148 port 59420 ssh2
...
2020-04-18 13:18:47
124.192.225.227 attackspambots
Apr 18 05:51:46 * sshd[12640]: Failed password for root from 124.192.225.227 port 7490 ssh2
2020-04-18 13:18:26
49.235.132.42 attack
Apr 18 05:00:37 localhost sshd[116493]: Invalid user ubuntu from 49.235.132.42 port 58442
Apr 18 05:00:37 localhost sshd[116493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.132.42
Apr 18 05:00:37 localhost sshd[116493]: Invalid user ubuntu from 49.235.132.42 port 58442
Apr 18 05:00:39 localhost sshd[116493]: Failed password for invalid user ubuntu from 49.235.132.42 port 58442 ssh2
Apr 18 05:06:06 localhost sshd[117106]: Invalid user admin from 49.235.132.42 port 34206
...
2020-04-18 13:07:34
67.219.146.230 attack
SpamScore above: 10.0
2020-04-18 13:25:49
187.10.136.172 attackbots
Port probing on unauthorized port 23
2020-04-18 13:04:26

Recently Reported IPs

122.139.74.5 19.64.214.212 148.250.28.120 217.206.90.62
190.225.252.13 115.200.35.127 51.119.148.16 97.173.96.92
87.4.15.203 228.90.242.19 22.38.120.89 26.223.122.247
150.63.48.7 140.41.175.169 152.224.230.51 167.137.105.37
4.202.181.36 239.92.36.102 13.123.130.129 177.63.213.4