Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.239.6.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.239.6.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022601 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 03:34:48 CST 2025
;; MSG SIZE  rcvd: 105
Host info
94.6.239.197.in-addr.arpa domain name pointer 94-6-239-197.r.airtel.ug.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.6.239.197.in-addr.arpa	name = 94-6-239-197.r.airtel.ug.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
211.195.46.117 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-10 18:40:37
122.51.187.118 attackspambots
Aug 10 10:12:38 *** sshd[18240]: User root from 122.51.187.118 not allowed because not listed in AllowUsers
2020-08-10 18:26:17
183.136.225.44 attackbotsspam
Sent packet to closed port: 40000
2020-08-10 18:10:11
59.148.107.236 attack
C1,WP GET /wp-login.php
2020-08-10 18:23:55
150.109.45.228 attackspambots
2020-08-09 UTC: (8x) - root(8x)
2020-08-10 18:31:06
129.204.238.250 attackspambots
Aug 10 12:28:59 vm0 sshd[27060]: Failed password for root from 129.204.238.250 port 33448 ssh2
...
2020-08-10 18:36:56
41.77.146.98 attack
2020-08-10T03:46:38.9896441495-001 sshd[7491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98  user=root
2020-08-10T03:46:41.0473021495-001 sshd[7491]: Failed password for root from 41.77.146.98 port 60604 ssh2
2020-08-10T04:01:23.0027931495-001 sshd[8148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98  user=root
2020-08-10T04:01:25.4168031495-001 sshd[8148]: Failed password for root from 41.77.146.98 port 44094 ssh2
2020-08-10T04:16:10.7386591495-001 sshd[8783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98  user=root
2020-08-10T04:16:13.0572641495-001 sshd[8783]: Failed password for root from 41.77.146.98 port 55838 ssh2
...
2020-08-10 18:14:37
120.92.109.69 attackbotsspam
Aug 10 12:23:25 lunarastro sshd[24561]: Failed password for root from 120.92.109.69 port 4986 ssh2
Aug 10 12:29:33 lunarastro sshd[24594]: Failed password for root from 120.92.109.69 port 1450 ssh2
2020-08-10 18:26:59
150.136.5.221 attackspam
Aug 10 09:37:37 inter-technics sshd[26939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.5.221  user=root
Aug 10 09:37:39 inter-technics sshd[26939]: Failed password for root from 150.136.5.221 port 55874 ssh2
Aug 10 09:41:30 inter-technics sshd[27246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.5.221  user=root
Aug 10 09:41:32 inter-technics sshd[27246]: Failed password for root from 150.136.5.221 port 39114 ssh2
Aug 10 09:45:24 inter-technics sshd[27440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.5.221  user=root
Aug 10 09:45:25 inter-technics sshd[27440]: Failed password for root from 150.136.5.221 port 50584 ssh2
...
2020-08-10 18:33:53
51.178.30.154 attack
51.178.30.154 - - [10/Aug/2020:09:45:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1968 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.30.154 - - [10/Aug/2020:09:45:25 +0100] "POST /wp-login.php HTTP/1.1" 200 1952 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.30.154 - - [10/Aug/2020:09:45:25 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 18:02:30
61.12.67.133 attack
2020-08-10T10:10:00.081054centos sshd[2602]: Failed password for root from 61.12.67.133 port 50471 ssh2
2020-08-10T10:14:19.212285centos sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.67.133  user=root
2020-08-10T10:14:21.626023centos sshd[3344]: Failed password for root from 61.12.67.133 port 18102 ssh2
...
2020-08-10 18:10:32
114.219.65.190 attackspam
(eximsyntax) Exim syntax errors from 114.219.65.190 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-10 08:19:06 SMTP call from [114.219.65.190] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-08-10 18:34:27
43.251.37.21 attack
Bruteforce detected by fail2ban
2020-08-10 18:20:30
129.211.28.16 attackbots
Bruteforce detected by fail2ban
2020-08-10 18:14:00
162.241.183.131 attackspam
(mod_security) mod_security (id:210492) triggered by 162.241.183.131 (US/United States/server.sihuilubin.com): 5 in the last 3600 secs
2020-08-10 18:25:01

Recently Reported IPs

214.243.150.106 194.13.178.247 177.10.207.12 160.74.235.174
187.232.112.159 124.126.107.76 15.47.182.147 103.14.166.148
152.32.235.69 107.243.183.129 140.20.170.46 180.154.230.126
101.128.30.221 129.187.228.195 26.87.99.125 96.240.70.26
2.187.229.99 72.235.83.51 65.86.39.159 170.93.178.158