Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.34.8.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.34.8.20.			IN	A

;; AUTHORITY SECTION:
.			392	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:16:52 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 20.8.34.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.8.34.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
68.183.55.223 attackspam
Unauthorized connection attempt detected from IP address 68.183.55.223 to port 2220 [J]
2020-01-26 16:35:59
218.92.0.145 attackbotsspam
Jan 26 05:08:41 firewall sshd[5986]: Failed password for root from 218.92.0.145 port 54738 ssh2
Jan 26 05:08:45 firewall sshd[5986]: Failed password for root from 218.92.0.145 port 54738 ssh2
Jan 26 05:08:48 firewall sshd[5986]: Failed password for root from 218.92.0.145 port 54738 ssh2
...
2020-01-26 16:09:55
90.51.66.105 attackspambots
Jan 26 05:48:33 roki sshd[25695]: Invalid user pi from 90.51.66.105
Jan 26 05:48:33 roki sshd[25696]: Invalid user pi from 90.51.66.105
Jan 26 05:48:33 roki sshd[25695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.51.66.105
Jan 26 05:48:34 roki sshd[25696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.51.66.105
Jan 26 05:48:35 roki sshd[25696]: Failed password for invalid user pi from 90.51.66.105 port 46282 ssh2
Jan 26 05:48:35 roki sshd[25695]: Failed password for invalid user pi from 90.51.66.105 port 46280 ssh2
...
2020-01-26 16:44:32
150.129.89.229 attackspambots
Unauthorized connection attempt detected from IP address 150.129.89.229 to port 445
2020-01-26 16:09:25
77.134.128.40 attack
Unauthorized connection attempt detected from IP address 77.134.128.40 to port 2220 [J]
2020-01-26 16:28:02
124.123.28.43 attackbotsspam
1580014140 - 01/26/2020 05:49:00 Host: 124.123.28.43/124.123.28.43 Port: 445 TCP Blocked
2020-01-26 16:35:19
112.158.118.159 attackbots
Jan 26 07:53:55 ks10 sshd[714514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.158.118.159 
Jan 26 07:53:57 ks10 sshd[714514]: Failed password for invalid user mukesh from 112.158.118.159 port 34616 ssh2
...
2020-01-26 16:06:01
202.77.112.245 attack
Jan 26 08:49:31 OPSO sshd\[28451\]: Invalid user lorelei from 202.77.112.245 port 52428
Jan 26 08:49:31 OPSO sshd\[28451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.112.245
Jan 26 08:49:33 OPSO sshd\[28451\]: Failed password for invalid user lorelei from 202.77.112.245 port 52428 ssh2
Jan 26 08:52:05 OPSO sshd\[29167\]: Invalid user testuser from 202.77.112.245 port 46112
Jan 26 08:52:05 OPSO sshd\[29167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.112.245
2020-01-26 16:17:13
178.128.124.204 attackbots
Unauthorized connection attempt detected from IP address 178.128.124.204 to port 2220 [J]
2020-01-26 16:27:13
218.92.0.179 attackbotsspam
Jan 26 09:21:58 * sshd[5673]: Failed password for root from 218.92.0.179 port 14863 ssh2
Jan 26 09:22:12 * sshd[5673]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 14863 ssh2 [preauth]
2020-01-26 16:29:29
148.70.159.5 attack
Jan 26 09:08:52 MainVPS sshd[12425]: Invalid user ftptest from 148.70.159.5 port 57900
Jan 26 09:08:52 MainVPS sshd[12425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.159.5
Jan 26 09:08:52 MainVPS sshd[12425]: Invalid user ftptest from 148.70.159.5 port 57900
Jan 26 09:08:54 MainVPS sshd[12425]: Failed password for invalid user ftptest from 148.70.159.5 port 57900 ssh2
Jan 26 09:12:47 MainVPS sshd[20216]: Invalid user gz from 148.70.159.5 port 59504
...
2020-01-26 16:25:39
207.154.239.128 attack
Unauthorized connection attempt detected from IP address 207.154.239.128 to port 2220 [J]
2020-01-26 16:31:49
125.7.152.105 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.7.152.105 
Failed password for invalid user weblogic from 125.7.152.105 port 47116 ssh2
Failed password for root from 125.7.152.105 port 34292 ssh2
2020-01-26 16:23:42
87.197.154.139 attack
Jan 26 09:14:33 lnxmail61 sshd[458]: Failed password for root from 87.197.154.139 port 43776 ssh2
Jan 26 09:14:33 lnxmail61 sshd[458]: Failed password for root from 87.197.154.139 port 43776 ssh2
2020-01-26 16:14:59
110.43.34.48 attackspam
Unauthorized connection attempt detected from IP address 110.43.34.48 to port 2220 [J]
2020-01-26 16:04:58

Recently Reported IPs

194.33.96.11 194.35.120.207 194.35.226.111 194.36.160.15
194.35.226.10 194.36.162.172 194.36.162.152 194.36.147.174
194.36.162.173 194.36.162.136 194.35.226.207 194.36.166.10
194.36.160.50 194.36.174.124 24.55.0.1 194.36.45.165
194.36.44.31 194.36.43.54 194.36.43.32 194.36.45.197