Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.4.94.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.4.94.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:53:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
140.94.4.172.in-addr.arpa domain name pointer 172-4-94-140.lightspeed.sntcca.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.94.4.172.in-addr.arpa	name = 172-4-94-140.lightspeed.sntcca.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.176.204.91 attackbots
Invalid user ubuntu from 220.176.204.91 port 14575
2020-09-27 14:40:58
2.40.7.42 attack
Automatic report - Port Scan Attack
2020-09-27 14:00:51
188.166.233.31 attackbots
firewall-block, port(s): 22/tcp
2020-09-27 13:59:03
201.11.70.28 attack
vps:sshd-InvalidUser
2020-09-27 14:16:22
102.165.30.1 attack
Automatic report - Banned IP Access
2020-09-27 14:40:07
120.59.122.254 attack
port scan and connect, tcp 23 (telnet)
2020-09-27 14:05:27
185.66.128.228 attackbots
445/tcp
[2020-09-26]1pkt
2020-09-27 14:10:46
78.187.255.74 attackbots
445/tcp
[2020-09-26]1pkt
2020-09-27 14:19:08
123.173.80.62 attackspam
5555/tcp
[2020-09-26]1pkt
2020-09-27 14:08:09
85.209.0.103 attackbots
Multiple SSH login attempts.
2020-09-27 14:36:00
222.186.175.182 attackbots
Sep 27 03:33:20 firewall sshd[28162]: Failed password for root from 222.186.175.182 port 62008 ssh2
Sep 27 03:33:23 firewall sshd[28162]: Failed password for root from 222.186.175.182 port 62008 ssh2
Sep 27 03:33:27 firewall sshd[28162]: Failed password for root from 222.186.175.182 port 62008 ssh2
...
2020-09-27 14:34:06
221.149.43.38 attack
"fail2ban match"
2020-09-27 14:22:13
178.128.51.253 attackbots
Sep 27 04:57:06 haigwepa sshd[21249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.51.253 
Sep 27 04:57:08 haigwepa sshd[21249]: Failed password for invalid user liu from 178.128.51.253 port 59024 ssh2
...
2020-09-27 14:27:14
61.223.236.162 attack
23/tcp
[2020-09-26]1pkt
2020-09-27 14:27:44
141.105.104.193 attack
Sep 26 22:38:28 andromeda sshd\[12737\]: Invalid user admin from 141.105.104.193 port 47771
Sep 26 22:38:35 andromeda sshd\[12992\]: Invalid user admin from 141.105.104.193 port 47785
Sep 26 22:38:36 andromeda sshd\[12992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.105.104.193
2020-09-27 14:25:04

Recently Reported IPs

166.112.69.210 195.114.29.209 158.139.235.105 245.170.29.127
226.210.1.158 66.211.27.174 112.158.55.41 254.128.170.194
40.17.94.86 184.61.207.51 232.42.39.209 51.123.128.61
36.9.33.104 251.204.100.17 36.119.173.229 101.139.34.224
113.36.200.15 239.169.111.170 89.205.189.237 214.163.226.188