Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Helsinki

Region: Uusimaa [Finnish] / Nyland [Swedish]

Country: Finland

Internet Service Provider: Elisa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.240.46.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.240.46.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:46:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 114.46.240.194.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 194.240.46.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.116.154.5 attack
...
2020-09-13 12:49:08
206.189.88.253 attack
Port scan: Attack repeated for 24 hours
2020-09-13 13:05:07
200.233.163.65 attackbotsspam
Failed password for root from 200.233.163.65 port 60660 ssh2
2020-09-13 12:30:10
128.199.212.15 attackspambots
Sep 13 03:00:27 XXXXXX sshd[12823]: Invalid user ben from 128.199.212.15 port 59814
2020-09-13 12:37:43
196.52.43.119 attackbots
1234/tcp 111/tcp 7080/tcp...
[2020-07-14/09-12]50pkt,38pt.(tcp),5pt.(udp)
2020-09-13 12:50:19
104.144.170.32 attack
Registration form abuse
2020-09-13 12:58:57
27.7.154.0 attackspambots
firewall-block, port(s): 23/tcp
2020-09-13 12:29:41
134.17.94.55 attackspam
Sep 13 04:31:54 game-panel sshd[15562]: Failed password for root from 134.17.94.55 port 2387 ssh2
Sep 13 04:36:27 game-panel sshd[15703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.55
Sep 13 04:36:29 game-panel sshd[15703]: Failed password for invalid user omn from 134.17.94.55 port 2388 ssh2
2020-09-13 12:53:26
111.175.186.150 attack
s2.hscode.pl - SSH Attack
2020-09-13 12:38:35
218.92.0.248 attackbotsspam
$f2bV_matches
2020-09-13 12:50:00
202.83.45.105 attack
DATE:2020-09-12 18:59:35, IP:202.83.45.105, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-09-13 12:49:39
187.72.177.131 attackbotsspam
Sep 13 02:47:37 * sshd[15325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.72.177.131
Sep 13 02:47:39 * sshd[15325]: Failed password for invalid user viorel from 187.72.177.131 port 36840 ssh2
2020-09-13 12:39:44
61.76.169.138 attackbotsspam
Sep 13 04:20:48 host1 sshd[680234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138 
Sep 13 04:20:48 host1 sshd[680234]: Invalid user ns2c from 61.76.169.138 port 5978
Sep 13 04:20:50 host1 sshd[680234]: Failed password for invalid user ns2c from 61.76.169.138 port 5978 ssh2
Sep 13 04:25:11 host1 sshd[682076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138  user=root
Sep 13 04:25:13 host1 sshd[682076]: Failed password for root from 61.76.169.138 port 23399 ssh2
...
2020-09-13 12:31:19
196.28.236.5 attackbots
Port Scan
...
2020-09-13 12:32:47
192.42.116.14 attack
Sep 13 06:04:17 inter-technics sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.14  user=root
Sep 13 06:04:19 inter-technics sshd[12114]: Failed password for root from 192.42.116.14 port 60552 ssh2
Sep 13 06:04:22 inter-technics sshd[12114]: Failed password for root from 192.42.116.14 port 60552 ssh2
Sep 13 06:04:17 inter-technics sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.14  user=root
Sep 13 06:04:19 inter-technics sshd[12114]: Failed password for root from 192.42.116.14 port 60552 ssh2
Sep 13 06:04:22 inter-technics sshd[12114]: Failed password for root from 192.42.116.14 port 60552 ssh2
Sep 13 06:04:17 inter-technics sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.14  user=root
Sep 13 06:04:19 inter-technics sshd[12114]: Failed password for root from 192.42.116.14 port 60552 ssh2
Sep 13 06
...
2020-09-13 12:50:48

Recently Reported IPs

77.169.136.85 138.128.248.182 38.179.63.111 55.85.142.225
222.130.72.249 250.32.199.131 223.177.50.142 66.157.174.15
238.138.36.117 15.212.100.79 14.116.123.77 230.198.97.140
152.183.147.126 103.175.92.227 218.27.231.8 24.102.218.87
162.62.190.227 107.213.216.103 215.248.205.206 64.119.212.28