Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.133.94.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.133.94.93.			IN	A

;; AUTHORITY SECTION:
.			452	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 10:46:34 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 93.94.133.158.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 93.94.133.158.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.150.186.136 attackspam
Unauthorized connection attempt detected from IP address 37.150.186.136 to port 445 [T]
2020-08-14 03:16:08
51.210.15.231 attackbots
" "
2020-08-14 03:14:21
97.73.0.51 attackspam
Unauthorized connection attempt detected from IP address 97.73.0.51 to port 445 [T]
2020-08-14 03:09:05
164.52.24.171 attackspambots
Unauthorized connection attempt detected from IP address 164.52.24.171 to port 1723 [T]
2020-08-14 03:45:51
185.202.0.5 attack
Unauthorized connection attempt detected from IP address 185.202.0.5 to port 5 [T]
2020-08-14 03:25:27
14.235.23.180 attack
Unauthorized connection attempt detected from IP address 14.235.23.180 to port 445 [T]
2020-08-14 03:16:52
203.205.35.32 attackspambots
Unauthorized connection attempt detected from IP address 203.205.35.32 to port 445 [T]
2020-08-14 03:20:13
80.241.212.44 attackspam
Unauthorized connection attempt detected from IP address 80.241.212.44 to port 2212 [T]
2020-08-14 03:11:47
78.29.43.21 attackspambots
Unauthorized connection attempt detected from IP address 78.29.43.21 to port 445 [T]
2020-08-14 03:12:43
222.186.30.57 attackspam
Aug 13 19:17:37 marvibiene sshd[23146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Aug 13 19:17:39 marvibiene sshd[23146]: Failed password for root from 222.186.30.57 port 31219 ssh2
Aug 13 19:17:41 marvibiene sshd[23146]: Failed password for root from 222.186.30.57 port 31219 ssh2
Aug 13 19:17:37 marvibiene sshd[23146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Aug 13 19:17:39 marvibiene sshd[23146]: Failed password for root from 222.186.30.57 port 31219 ssh2
Aug 13 19:17:41 marvibiene sshd[23146]: Failed password for root from 222.186.30.57 port 31219 ssh2
2020-08-14 03:18:46
103.78.137.54 attack
Unauthorized connection attempt detected from IP address 103.78.137.54 to port 445 [T]
2020-08-14 03:31:04
172.105.89.161 attack
Port scan: Attack repeated for 24 hours
2020-08-14 03:26:40
221.204.177.15 attackspambots
Unauthorized connection attempt detected from IP address 221.204.177.15 to port 1433 [T]
2020-08-14 03:40:31
102.165.30.41 attackbots
Unauthorized connection attempt detected from IP address 102.165.30.41 to port 80 [T]
2020-08-14 03:08:36
121.186.175.229 attackspambots
Unauthorized connection attempt detected from IP address 121.186.175.229 to port 9530 [T]
2020-08-14 03:29:23

Recently Reported IPs

220.36.74.77 79.242.124.174 255.177.70.211 187.189.143.41
21.23.125.232 52.97.137.200 86.43.35.109 184.214.230.217
73.193.108.247 51.38.106.156 80.183.147.189 45.18.24.108
253.247.174.180 243.72.192.77 150.144.71.47 153.191.221.50
87.219.242.60 101.38.53.217 79.38.206.102 224.82.155.156