Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.105.64.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.105.64.94.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103001 1800 900 604800 86400

;; Query time: 908 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 07:57:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 94.64.105.198.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 94.64.105.198.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
189.219.77.32 attackspam
Unauthorized connection attempt from IP address 189.219.77.32 on Port 445(SMB)
2020-09-03 15:53:13
103.72.144.228 attackbotsspam
Invalid user nas from 103.72.144.228 port 48750
2020-09-03 15:51:48
83.34.204.144 attackspambots
1599066155 - 09/02/2020 19:02:35 Host: 83.34.204.144/83.34.204.144 Port: 445 TCP Blocked
2020-09-03 15:53:31
175.37.149.77 attackbots
Unauthorized connection attempt detected from IP address 175.37.149.77 to port 2323 [T]
2020-09-03 15:32:01
185.165.41.237 attackspambots
Attempted connection to port 445.
2020-09-03 15:44:45
103.138.68.74 attackbots
Unauthorized connection attempt from IP address 103.138.68.74 on Port 445(SMB)
2020-09-03 16:05:18
222.186.30.35 attack
Sep  3 09:45:55 abendstille sshd\[7675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Sep  3 09:45:57 abendstille sshd\[7675\]: Failed password for root from 222.186.30.35 port 11185 ssh2
Sep  3 09:46:05 abendstille sshd\[7904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Sep  3 09:46:07 abendstille sshd\[7904\]: Failed password for root from 222.186.30.35 port 36790 ssh2
Sep  3 09:46:14 abendstille sshd\[8066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
...
2020-09-03 16:07:18
134.19.215.196 attackspam
Draytek Vigor Remote Command Execution Vulnerability
2020-09-03 16:10:12
103.151.184.14 attackbotsspam
Unauthorized connection attempt from IP address 103.151.184.14 on Port 445(SMB)
2020-09-03 15:39:31
180.100.206.35 attackbotsspam
Attempted connection to port 32292.
2020-09-03 15:46:58
78.239.49.141 attackbotsspam
Unauthorized connection attempt from IP address 78.239.49.141 on Port 445(SMB)
2020-09-03 16:08:50
148.69.79.116 attackbotsspam
Unauthorized connection attempt from IP address 148.69.79.116 on Port 445(SMB)
2020-09-03 15:56:50
196.37.111.217 attack
$f2bV_matches
2020-09-03 16:03:18
178.233.128.130 attackspam
Attempted connection to port 445.
2020-09-03 15:47:12
67.245.42.189 attackspambots
[portscan] Port scan
2020-09-03 15:58:47

Recently Reported IPs

156.183.12.35 224.58.189.240 75.138.167.254 239.101.218.120
118.1.106.236 238.32.97.49 162.140.98.87 2a03:b0c0:2:f0::31:6001
196.9.60.49 180.20.40.229 128.126.139.33 90.71.137.242
160.106.7.30 30.198.131.200 57.68.224.35 114.139.103.170
146.56.214.148 42.32.230.148 192.243.48.238 191.28.229.72