Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
167.94.145.64 botsattack
Apache attacker IP
2025-07-04 12:34:41
167.94.145.107 botsattackproxy
SSH bot
2025-07-02 13:03:32
167.94.145.103 spamattackproxy
Postfix attacker IP
2025-07-01 12:41:43
167.94.145.102 botsattackproxy
SSH bot
2025-06-10 14:47:50
167.94.145.99 botsattackproxy
SSH bot
2025-03-19 20:57:58
167.94.145.104 botsattackproxy
BOOT SSH
2025-03-13 13:54:18
167.94.145.97 spambotsattackproxy
SSH bot
2025-02-10 14:24:23
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.94.145.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.94.145.130.			IN	A

;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 06:38:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 130.145.94.167.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.145.94.167.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.217.199.20 attackspam
no
2020-04-20 22:28:15
202.137.155.94 attackbotsspam
Invalid user admin from 202.137.155.94 port 58085
2020-04-20 22:21:26
45.65.196.14 attackbotsspam
2020-04-20T13:21:35.702264homeassistant sshd[14488]: Invalid user fp from 45.65.196.14 port 49794
2020-04-20T13:21:35.713969homeassistant sshd[14488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.65.196.14
...
2020-04-20 22:05:07
15.236.117.214 attack
Invalid user vcsa from 15.236.117.214 port 59694
2020-04-20 22:09:46
49.235.97.29 attackbots
Apr 20 17:46:03 gw1 sshd[902]: Failed password for root from 49.235.97.29 port 60159 ssh2
Apr 20 17:51:28 gw1 sshd[1222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.97.29
...
2020-04-20 22:03:30
14.187.127.172 attack
Invalid user admin from 14.187.127.172 port 46320
2020-04-20 22:10:20
213.158.10.101 attack
Invalid user aq from 213.158.10.101 port 49562
2020-04-20 22:18:03
61.19.23.170 attackspambots
Brute force SMTP login attempted.
...
2020-04-20 21:58:56
77.211.18.211 attackbotsspam
Invalid user admin from 77.211.18.211 port 36586
2020-04-20 21:54:12
69.229.6.34 attack
Invalid user test from 69.229.6.34 port 50782
2020-04-20 21:55:19
82.148.18.176 attack
Invalid user oa from 82.148.18.176 port 39094
2020-04-20 21:53:05
213.55.77.131 attack
ssh intrusion attempt
2020-04-20 22:19:04
218.17.56.50 attack
Invalid user so from 218.17.56.50 port 41310
2020-04-20 22:16:12
186.237.136.98 attackspam
Apr 20 16:19:01 prox sshd[14080]: Failed password for root from 186.237.136.98 port 54102 ssh2
Apr 20 16:25:22 prox sshd[31468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.237.136.98
2020-04-20 22:28:37
36.99.39.95 attack
prod6
...
2020-04-20 22:07:42

Recently Reported IPs

185.11.146.117 93.174.93.62 167.248.133.99 92.118.37.199
154.201.43.181 168.119.178.134 167.172.152.18 154.95.36.95
218.1.200.129 188.209.52.70 173.82.197.186 159.223.215.133
167.94.138.0 89.248.172.133 5.182.39.160 5.182.39.211
85.62.188.86 89.248.174.142 89.248.172.106 45.155.71.190