Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 170.122.52.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;170.122.52.94.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 17:27:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 94.52.122.170.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 170.122.52.94.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
154.65.33.198 attackbots
Jun 23 22:58:31 MK-Soft-VM3 sshd\[8089\]: Invalid user ubnt from 154.65.33.198 port 59489
Jun 23 22:58:31 MK-Soft-VM3 sshd\[8089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.65.33.198
Jun 23 22:58:33 MK-Soft-VM3 sshd\[8089\]: Failed password for invalid user ubnt from 154.65.33.198 port 59489 ssh2
...
2019-06-24 07:23:20
162.243.94.34 attackspam
SSH-BRUTEFORCE
2019-06-24 06:49:34
82.144.6.116 attackbotsspam
Jun 23 23:58:03 rpi sshd\[2353\]: Invalid user mysql2 from 82.144.6.116 port 57040
Jun 23 23:58:03 rpi sshd\[2353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.144.6.116
Jun 23 23:58:05 rpi sshd\[2353\]: Failed password for invalid user mysql2 from 82.144.6.116 port 57040 ssh2
2019-06-24 07:16:21
185.211.245.198 attackspambots
Bruteforce on smtp
2019-06-24 06:42:37
178.128.7.124 attackspam
TCP port 25 (SMTP) attempt blocked by hMailServer IP-check. Abuse score 15%
2019-06-24 06:47:03
173.23.225.40 attackspambots
Jun 23 21:16:49 sshgateway sshd\[10190\]: Invalid user braxton from 173.23.225.40
Jun 23 21:16:49 sshgateway sshd\[10190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.23.225.40
Jun 23 21:16:51 sshgateway sshd\[10190\]: Failed password for invalid user braxton from 173.23.225.40 port 52420 ssh2
2019-06-24 07:07:04
69.59.106.49 attackbots
Jun 23 23:52:36 mail sshd\[1713\]: Invalid user mta from 69.59.106.49 port 48342
Jun 23 23:52:36 mail sshd\[1713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.59.106.49
Jun 23 23:52:38 mail sshd\[1713\]: Failed password for invalid user mta from 69.59.106.49 port 48342 ssh2
Jun 23 23:59:39 mail sshd\[2767\]: Invalid user ggitau from 69.59.106.49 port 34360
Jun 23 23:59:39 mail sshd\[2767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.59.106.49
2019-06-24 06:44:40
186.249.94.135 attackbotsspam
failed_logins
2019-06-24 07:10:53
185.220.101.58 attackspam
Jun 23 21:39:09 cvbmail sshd\[18262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.58  user=root
Jun 23 21:39:11 cvbmail sshd\[18262\]: Failed password for root from 185.220.101.58 port 37911 ssh2
Jun 23 22:05:11 cvbmail sshd\[18771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.58  user=root
2019-06-24 07:02:09
191.83.110.255 attack
Jun 23 22:05:38 mail1 sshd\[25619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.83.110.255  user=root
Jun 23 22:05:41 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:43 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:45 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
Jun 23 22:05:48 mail1 sshd\[25619\]: Failed password for root from 191.83.110.255 port 39625 ssh2
...
2019-06-24 06:53:11
51.254.220.20 attackbotsspam
Invalid user test from 51.254.220.20 port 48971
2019-06-24 06:58:59
58.250.79.7 attackbotsspam
Jun 23 20:16:00 gitlab-ci sshd\[9299\]: Invalid user mediator from 58.250.79.7Jun 23 20:16:03 gitlab-ci sshd\[9301\]: Invalid user mlusr from 58.250.79.7
...
2019-06-24 07:18:25
162.243.133.156 attackbotsspam
23.06.2019 20:06:29 Connection to port 1900 blocked by firewall
2019-06-24 06:57:39
66.94.85.26 attackbotsspam
NAME : NET-106A CIDR : 66.94.69.0/25 SYN Flood DDoS Attack USA - Ohio - block certain countries :) IP: 66.94.85.26  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 07:11:49
129.126.68.238 attackbotsspam
Unauthorized connection attempt from IP address 129.126.68.238 on Port 445(SMB)
2019-06-24 07:21:09

Recently Reported IPs

8.15.228.240 96.92.126.52 131.144.126.193 70.197.74.22
9.250.38.159 237.141.154.1 59.173.75.4 96.32.141.194
184.173.87.34 227.6.140.61 95.99.150.80 156.111.109.24
82.109.112.75 94.156.134.187 151.71.185.149 246.75.17.73
195.153.51.68 59.91.83.134 174.98.234.170 183.58.192.115