Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Darmstadt

Region: Hessen

Country: Germany

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.200.112.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.200.112.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:15:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
94.112.200.2.in-addr.arpa domain name pointer dslb-002-200-112-094.002.200.pools.vodafone-ip.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.112.200.2.in-addr.arpa	name = dslb-002-200-112-094.002.200.pools.vodafone-ip.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.107.178.203 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-07-14 02:15:29
157.245.142.218 attackspambots
 TCP (SYN) 157.245.142.218:58825 -> port 25226, len 44
2020-07-14 02:06:50
206.189.171.204 attackbots
detected by Fail2Ban
2020-07-14 02:01:07
1.54.14.216 attack
Port scanning [2 denied]
2020-07-14 02:04:35
185.173.60.5 attackbots
Unauthorized connection attempt detected from IP address 185.173.60.5 to port 80
2020-07-14 02:16:43
159.65.133.150 attackbots
07/13/2020-11:15:19.675305 159.65.133.150 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-14 02:06:26
118.130.153.101 attack
Invalid user boning from 118.130.153.101 port 35618
2020-07-14 02:33:16
95.42.101.183 attack
from 95-42-101-183.ip.btc-net.bg (95-42-101-183.ip.btc-net.bg [95.42.101.183]) by cauvin.org with ESMTP ; Mon, 13 Jul 2020 07:15:14 -0500
2020-07-14 02:17:07
5.188.206.195 attack
Port probe and 6 failed login attempts on SMTP:25.
IP auto-blocked.
2020-07-14 01:59:31
45.235.86.21 attackspambots
2020-07-13T19:35:34.816424+02:00  sshd[31690]: Failed password for invalid user gjk from 45.235.86.21 port 38250 ssh2
2020-07-14 02:31:48
51.79.159.27 attackspam
Jul 13 17:05:37 mail sshd[27510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.159.27 
Jul 13 17:05:39 mail sshd[27510]: Failed password for invalid user ubuntu from 51.79.159.27 port 37006 ssh2
...
2020-07-14 02:13:13
104.236.136.172 attackspambots
Jul 13 20:28:02 debian-2gb-nbg1-2 kernel: \[16923455.791984\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.236.136.172 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=31587 PROTO=TCP SPT=51977 DPT=23202 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-14 02:33:53
222.186.180.8 attack
Jul 13 20:22:35 ns381471 sshd[1288]: Failed password for root from 222.186.180.8 port 53714 ssh2
Jul 13 20:22:46 ns381471 sshd[1288]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 53714 ssh2 [preauth]
2020-07-14 02:23:27
185.173.35.49 attackspam
Port scan denied
2020-07-14 02:36:27
139.198.191.217 attack
2020-07-13T16:45:18.695165galaxy.wi.uni-potsdam.de sshd[12081]: Invalid user osboxes from 139.198.191.217 port 38354
2020-07-13T16:45:18.700381galaxy.wi.uni-potsdam.de sshd[12081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
2020-07-13T16:45:18.695165galaxy.wi.uni-potsdam.de sshd[12081]: Invalid user osboxes from 139.198.191.217 port 38354
2020-07-13T16:45:20.935895galaxy.wi.uni-potsdam.de sshd[12081]: Failed password for invalid user osboxes from 139.198.191.217 port 38354 ssh2
2020-07-13T16:47:42.916293galaxy.wi.uni-potsdam.de sshd[12337]: Invalid user like from 139.198.191.217 port 32876
2020-07-13T16:47:42.921288galaxy.wi.uni-potsdam.de sshd[12337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217
2020-07-13T16:47:42.916293galaxy.wi.uni-potsdam.de sshd[12337]: Invalid user like from 139.198.191.217 port 32876
2020-07-13T16:47:44.925949galaxy.wi.uni-potsdam.de sshd[1233
...
2020-07-14 02:27:09

Recently Reported IPs

65.247.180.234 22.82.187.146 216.36.166.60 48.71.109.246
92.127.46.83 47.32.69.114 184.205.77.255 122.253.92.97
240.31.173.2 6.25.23.97 181.206.148.137 54.151.87.197
31.174.9.154 37.129.15.42 179.70.228.26 93.47.115.148
24.255.39.175 67.159.229.62 196.226.63.171 47.5.8.80