Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.164.94.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.164.94.9.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:41:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 9.94.164.144.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.94.164.144.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
206.189.221.160 attackbotsspam
Sep 17 06:52:30 server sshd\[8752\]: Invalid user webshell from 206.189.221.160 port 42588
Sep 17 06:52:30 server sshd\[8752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.221.160
Sep 17 06:52:32 server sshd\[8752\]: Failed password for invalid user webshell from 206.189.221.160 port 42588 ssh2
Sep 17 06:56:28 server sshd\[15769\]: Invalid user andrei from 206.189.221.160 port 55432
Sep 17 06:56:28 server sshd\[15769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.221.160
2019-09-17 15:29:16
182.61.33.2 attackbots
Sep 17 05:37:49 dedicated sshd[16765]: Invalid user sebastian from 182.61.33.2 port 41488
2019-09-17 15:05:07
58.216.239.202 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-09-17 15:19:35
59.36.75.227 attack
Sep 17 01:47:00 xtremcommunity sshd\[169009\]: Invalid user ubuntu from 59.36.75.227 port 60758
Sep 17 01:47:00 xtremcommunity sshd\[169009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.75.227
Sep 17 01:47:02 xtremcommunity sshd\[169009\]: Failed password for invalid user ubuntu from 59.36.75.227 port 60758 ssh2
Sep 17 01:50:00 xtremcommunity sshd\[169063\]: Invalid user wv from 59.36.75.227 port 32842
Sep 17 01:50:00 xtremcommunity sshd\[169063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.75.227
...
2019-09-17 15:40:54
109.190.43.165 attackbots
Sep 17 08:48:43 saschabauer sshd[3222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.190.43.165
Sep 17 08:48:46 saschabauer sshd[3222]: Failed password for invalid user 8 from 109.190.43.165 port 55245 ssh2
2019-09-17 15:39:30
149.56.23.154 attack
Sep 16 21:07:35 hiderm sshd\[25253\]: Invalid user spamfiltrer from 149.56.23.154
Sep 16 21:07:35 hiderm sshd\[25253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns529890.ip-149-56-23.net
Sep 16 21:07:37 hiderm sshd\[25253\]: Failed password for invalid user spamfiltrer from 149.56.23.154 port 46292 ssh2
Sep 16 21:11:43 hiderm sshd\[25704\]: Invalid user salvatore from 149.56.23.154
Sep 16 21:11:43 hiderm sshd\[25704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns529890.ip-149-56-23.net
2019-09-17 15:11:55
49.88.112.85 attack
2019-09-17T07:32:14.927266abusebot-4.cloudsearch.cf sshd\[23796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.85  user=root
2019-09-17 15:35:28
167.99.194.54 attack
Sep 17 07:41:26 lnxweb62 sshd[10001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
2019-09-17 14:55:21
103.1.40.189 attackbotsspam
Sep 17 01:19:09 TORMINT sshd\[28411\]: Invalid user hajna from 103.1.40.189
Sep 17 01:19:09 TORMINT sshd\[28411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.40.189
Sep 17 01:19:11 TORMINT sshd\[28411\]: Failed password for invalid user hajna from 103.1.40.189 port 46504 ssh2
...
2019-09-17 15:32:59
220.180.239.104 attack
Sep 16 20:50:17 web1 sshd\[6325\]: Invalid user antonio from 220.180.239.104
Sep 16 20:50:17 web1 sshd\[6325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.239.104
Sep 16 20:50:19 web1 sshd\[6325\]: Failed password for invalid user antonio from 220.180.239.104 port 19949 ssh2
Sep 16 20:57:38 web1 sshd\[6980\]: Invalid user mongodb from 220.180.239.104
Sep 16 20:57:38 web1 sshd\[6980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.239.104
2019-09-17 15:37:46
112.85.42.89 attack
Sep 17 08:48:49 srv206 sshd[4812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep 17 08:48:51 srv206 sshd[4812]: Failed password for root from 112.85.42.89 port 56183 ssh2
...
2019-09-17 15:17:39
134.175.39.108 attackspam
$f2bV_matches_ltvn
2019-09-17 15:15:24
190.186.4.146 attackbotsspam
Chat Spam
2019-09-17 15:45:05
37.59.224.39 attackbotsspam
Sep 17 07:08:06 taivassalofi sshd[112003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.224.39
Sep 17 07:08:08 taivassalofi sshd[112003]: Failed password for invalid user administrator from 37.59.224.39 port 34199 ssh2
...
2019-09-17 15:11:11
77.247.110.199 attackspam
\[2019-09-17 02:51:36\] NOTICE\[20685\] chan_sip.c: Registration from '"1104"\' failed for '77.247.110.199:23593' - Wrong password
\[2019-09-17 02:51:36\] SECURITY\[20693\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-17T02:51:36.447-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1104",SessionID="0x7f8a6c3857d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.199/23593",Challenge="684302d7",ReceivedChallenge="684302d7",ReceivedHash="fa55df65f59a270daad094111a37e6af"
\[2019-09-17 02:51:36\] NOTICE\[20685\] chan_sip.c: Registration from '"1104"\' failed for '77.247.110.199:17770' - Wrong password
\[2019-09-17 02:51:36\] SECURITY\[20693\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-09-17T02:51:36.609-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1104",SessionID="0x7f8a6c5373d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247
2019-09-17 15:18:12

Recently Reported IPs

78.82.109.240 224.249.229.148 135.226.151.240 101.22.74.240
249.250.201.210 156.181.214.93 76.53.103.53 27.210.154.12
172.237.164.196 163.108.30.175 194.94.36.223 175.208.165.135
30.218.85.2 176.223.18.212 192.205.13.153 41.100.92.16
85.47.206.61 16.222.115.231 22.28.50.190 61.111.1.143