Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.94.71.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;147.94.71.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:19:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
45.71.94.147.in-addr.arpa domain name pointer eduroam-1-71-45.univ-amu.fr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.71.94.147.in-addr.arpa	name = eduroam-1-71-45.univ-amu.fr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.86.16.202 attack
Trying ports that it shouldn't be.
2019-07-20 04:56:05
89.165.38.100 attackbotsspam
23/tcp
[2019-07-19]1pkt
2019-07-20 05:17:06
140.249.35.66 attack
Jul 19 22:56:34 ubuntu-2gb-nbg1-dc3-1 sshd[17193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.35.66
Jul 19 22:56:36 ubuntu-2gb-nbg1-dc3-1 sshd[17193]: Failed password for invalid user jocelyn from 140.249.35.66 port 47508 ssh2
...
2019-07-20 05:19:58
54.38.47.28 attackbotsspam
Jul 19 22:49:22 legacy sshd[22830]: Failed password for root from 54.38.47.28 port 43204 ssh2
Jul 19 22:53:55 legacy sshd[22942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.47.28
Jul 19 22:53:57 legacy sshd[22942]: Failed password for invalid user kevin from 54.38.47.28 port 42202 ssh2
...
2019-07-20 05:11:03
171.234.152.77 attackbots
Automatic report - Port Scan Attack
2019-07-20 05:14:11
118.70.151.60 attack
23/tcp
[2019-07-19]1pkt
2019-07-20 05:31:13
165.227.150.158 attack
Jul 19 22:44:53 meumeu sshd[12157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158 
Jul 19 22:44:55 meumeu sshd[12157]: Failed password for invalid user tester1 from 165.227.150.158 port 55983 ssh2
Jul 19 22:49:20 meumeu sshd[12996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158 
...
2019-07-20 05:06:55
151.253.43.75 attackspambots
Jul 19 18:41:44 host sshd\[40887\]: Invalid user vg from 151.253.43.75 port 42592
Jul 19 18:41:44 host sshd\[40887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.253.43.75
...
2019-07-20 05:02:36
88.231.148.232 attackspambots
Automatic report - Port Scan Attack
2019-07-20 05:20:33
189.18.243.210 attack
Jul 19 17:09:07 vps200512 sshd\[7899\]: Invalid user yyy from 189.18.243.210
Jul 19 17:09:07 vps200512 sshd\[7899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.243.210
Jul 19 17:09:08 vps200512 sshd\[7899\]: Failed password for invalid user yyy from 189.18.243.210 port 41439 ssh2
Jul 19 17:14:55 vps200512 sshd\[8065\]: Invalid user teacher from 189.18.243.210
Jul 19 17:14:55 vps200512 sshd\[8065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.243.210
2019-07-20 05:16:44
175.142.59.85 attackspam
Jul 19 23:07:13 v22018076622670303 sshd\[4086\]: Invalid user brian from 175.142.59.85 port 33368
Jul 19 23:07:13 v22018076622670303 sshd\[4086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.142.59.85
Jul 19 23:07:15 v22018076622670303 sshd\[4086\]: Failed password for invalid user brian from 175.142.59.85 port 33368 ssh2
...
2019-07-20 05:07:29
201.187.19.201 attackbots
445/tcp
[2019-07-19]1pkt
2019-07-20 05:04:35
110.7.192.194 attackbots
60001/tcp
[2019-07-19]1pkt
2019-07-20 05:08:19
190.14.232.181 attackbots
445/tcp
[2019-07-19]1pkt
2019-07-20 05:12:16
42.202.36.193 attack
Automatic report generated by Wazuh
2019-07-20 05:21:20

Recently Reported IPs

127.89.104.215 226.68.83.163 162.74.107.210 81.73.183.30
228.65.242.174 169.238.33.198 25.97.52.111 191.230.99.10
97.42.236.5 219.177.161.132 226.6.253.19 152.8.148.36
209.177.48.152 62.111.6.163 71.34.196.50 33.202.248.253
25.36.214.253 56.134.253.146 43.36.160.205 4.34.102.165