Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.104.22.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17790
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.104.22.95.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101001 1800 900 604800 86400

;; Query time: 463 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 11 16:29:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
95.22.104.194.in-addr.arpa domain name pointer 95.22.104.194.rednet.biz.ua.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
95.22.104.194.in-addr.arpa	name = 95.22.104.194.rednet.biz.ua.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.193.69.218 attackbots
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07221037)
2019-07-22 16:21:45
104.248.191.159 attackbotsspam
2019-07-22T09:47:52.513060cavecanem sshd[19110]: Invalid user student1 from 104.248.191.159 port 56064
2019-07-22T09:47:52.515629cavecanem sshd[19110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.191.159
2019-07-22T09:47:52.513060cavecanem sshd[19110]: Invalid user student1 from 104.248.191.159 port 56064
2019-07-22T09:47:54.208261cavecanem sshd[19110]: Failed password for invalid user student1 from 104.248.191.159 port 56064 ssh2
2019-07-22T09:52:16.356764cavecanem sshd[24839]: Invalid user big from 104.248.191.159 port 51118
2019-07-22T09:52:16.359099cavecanem sshd[24839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.191.159
2019-07-22T09:52:16.356764cavecanem sshd[24839]: Invalid user big from 104.248.191.159 port 51118
2019-07-22T09:52:18.628278cavecanem sshd[24839]: Failed password for invalid user big from 104.248.191.159 port 51118 ssh2
2019-07-22T09:56:36.284252cavecanem sshd[
...
2019-07-22 16:23:53
197.164.164.88 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 01:34:27,718 INFO [shellcode_manager] (197.164.164.88) no match, writing hexdump (e91b1540353a96125f9b04080bcfa45d :2409134) - MS17010 (EternalBlue)
2019-07-22 16:04:09
51.255.35.58 attackspambots
Jul 22 04:04:09 vps200512 sshd\[17867\]: Invalid user pk from 51.255.35.58
Jul 22 04:04:09 vps200512 sshd\[17867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58
Jul 22 04:04:11 vps200512 sshd\[17867\]: Failed password for invalid user pk from 51.255.35.58 port 57151 ssh2
Jul 22 04:08:30 vps200512 sshd\[17934\]: Invalid user vinod from 51.255.35.58
Jul 22 04:08:30 vps200512 sshd\[17934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.58
2019-07-22 16:16:35
79.7.206.177 attack
Jul 22 10:26:56 bouncer sshd\[23872\]: Invalid user qhsupport from 79.7.206.177 port 50561
Jul 22 10:26:56 bouncer sshd\[23872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.206.177 
Jul 22 10:26:57 bouncer sshd\[23872\]: Failed password for invalid user qhsupport from 79.7.206.177 port 50561 ssh2
...
2019-07-22 16:29:44
118.70.109.83 attackspam
Unauthorized connection attempt from IP address 118.70.109.83 on Port 445(SMB)
2019-07-22 16:46:05
62.139.53.37 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 01:34:27,148 INFO [shellcode_manager] (62.139.53.37) no match, writing hexdump (eb53d8be65a67f488273c5c03c260ae8 :14667) - SMB (Unknown)
2019-07-22 16:13:03
170.246.207.38 attackspam
Brute force attempt
2019-07-22 16:05:45
210.14.77.102 attackspambots
Jul 22 08:45:29 debian sshd\[30620\]: Invalid user abc from 210.14.77.102 port 5495
Jul 22 08:45:29 debian sshd\[30620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102
...
2019-07-22 16:02:16
63.241.180.196 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 05:53:08,951 INFO [amun_request_handler] PortScan Detected on Port: 445 (63.241.180.196)
2019-07-22 16:17:59
145.239.67.136 attackbotsspam
[portscan] Port scan
2019-07-22 16:40:03
88.233.55.184 attackbotsspam
Automatic report - Port Scan Attack
2019-07-22 16:27:10
117.200.205.148 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 01:34:34,519 INFO [shellcode_manager] (117.200.205.148) no match, writing hexdump (d43ae1956ef66ee56ca672695960cb4a :2439079) - MS17010 (EternalBlue)
2019-07-22 15:55:40
167.99.200.84 attack
Jul 22 05:43:13 *** sshd[7056]: Invalid user ftpuser from 167.99.200.84
2019-07-22 16:14:05
79.21.136.129 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:57:15,388 INFO [amun_request_handler] PortScan Detected on Port: 445 (79.21.136.129)
2019-07-22 16:14:33

Recently Reported IPs

52.8.219.30 186.90.218.228 191.88.45.33 188.4.205.88
186.176.56.170 85.185.124.123 5.54.198.52 178.128.246.123
82.177.126.153 113.77.38.9 27.34.75.244 178.176.175.175
10.189.221.249 116.203.201.127 209.205.209.130 205.234.159.210
94.23.207.207 67.225.141.93 219.137.34.117 211.235.40.16