Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.242.94.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.242.94.23.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:44:06 CST 2025
;; MSG SIZE  rcvd: 104
Host info
23.94.242.2.in-addr.arpa domain name pointer dynamic-002-242-094-023.2.242.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
23.94.242.2.in-addr.arpa	name = dynamic-002-242-094-023.2.242.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.139.3.41 attack
2020-06-17T16:08:30.226817ionos.janbro.de sshd[128263]: Invalid user teamspeak from 175.139.3.41 port 39259
2020-06-17T16:08:32.248158ionos.janbro.de sshd[128263]: Failed password for invalid user teamspeak from 175.139.3.41 port 39259 ssh2
2020-06-17T16:13:05.455145ionos.janbro.de sshd[128282]: Invalid user esa from 175.139.3.41 port 7880
2020-06-17T16:13:05.535745ionos.janbro.de sshd[128282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.3.41
2020-06-17T16:13:05.455145ionos.janbro.de sshd[128282]: Invalid user esa from 175.139.3.41 port 7880
2020-06-17T16:13:07.577266ionos.janbro.de sshd[128282]: Failed password for invalid user esa from 175.139.3.41 port 7880 ssh2
2020-06-17T16:17:40.697035ionos.janbro.de sshd[128299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.3.41  user=root
2020-06-17T16:17:42.153874ionos.janbro.de sshd[128299]: Failed password for root from 175.139.3.41 port 41
...
2020-06-18 00:46:34
147.135.253.94 attackspambots
[2020-06-17 12:20:53] NOTICE[1273] chan_sip.c: Registration from '' failed for '147.135.253.94:59773' - Wrong password
[2020-06-17 12:20:53] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-17T12:20:53.350-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1897",SessionID="0x7f31c02f7128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94/59773",Challenge="16b19f7e",ReceivedChallenge="16b19f7e",ReceivedHash="058016c2285d3d6ba6b8bcf1a4a19b24"
[2020-06-17 12:22:34] NOTICE[1273] chan_sip.c: Registration from '' failed for '147.135.253.94:60452' - Wrong password
[2020-06-17 12:22:34] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-17T12:22:34.779-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9061",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.25
...
2020-06-18 00:39:56
85.209.0.101 attackspambots
Unauthorized connection attempt detected from IP address 85.209.0.101 to port 22
2020-06-18 00:53:22
129.211.81.193 attackbotsspam
2020-06-17T19:22:52.128868lavrinenko.info sshd[1044]: Invalid user vps from 129.211.81.193 port 36826
2020-06-17T19:22:52.139336lavrinenko.info sshd[1044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.81.193
2020-06-17T19:22:52.128868lavrinenko.info sshd[1044]: Invalid user vps from 129.211.81.193 port 36826
2020-06-17T19:22:53.430318lavrinenko.info sshd[1044]: Failed password for invalid user vps from 129.211.81.193 port 36826 ssh2
2020-06-17T19:27:34.559495lavrinenko.info sshd[1346]: Invalid user sophia from 129.211.81.193 port 60758
...
2020-06-18 00:38:59
202.137.134.61 attack
(imapd) Failed IMAP login from 202.137.134.61 (LA/Laos/-): 1 in the last 3600 secs
2020-06-18 00:51:50
186.113.18.109 attackbotsspam
Jun 17 10:15:46 server1 sshd\[31966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.113.18.109  user=root
Jun 17 10:15:48 server1 sshd\[31966\]: Failed password for root from 186.113.18.109 port 43158 ssh2
Jun 17 10:21:35 server1 sshd\[3521\]: Invalid user eis from 186.113.18.109
Jun 17 10:21:36 server1 sshd\[3521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.113.18.109 
Jun 17 10:21:38 server1 sshd\[3521\]: Failed password for invalid user eis from 186.113.18.109 port 42342 ssh2
...
2020-06-18 00:32:25
61.177.172.61 attackspam
Jun 17 18:29:02 pve1 sshd[3599]: Failed password for root from 61.177.172.61 port 47097 ssh2
Jun 17 18:29:06 pve1 sshd[3599]: Failed password for root from 61.177.172.61 port 47097 ssh2
...
2020-06-18 00:36:41
14.143.107.226 attackspambots
$f2bV_matches
2020-06-18 00:47:26
45.55.214.64 attackspambots
Jun 17 16:54:25 ip-172-31-62-245 sshd\[29074\]: Failed password for root from 45.55.214.64 port 57506 ssh2\
Jun 17 16:57:25 ip-172-31-62-245 sshd\[29128\]: Invalid user adk from 45.55.214.64\
Jun 17 16:57:27 ip-172-31-62-245 sshd\[29128\]: Failed password for invalid user adk from 45.55.214.64 port 57670 ssh2\
Jun 17 17:00:26 ip-172-31-62-245 sshd\[29167\]: Invalid user sammy from 45.55.214.64\
Jun 17 17:00:28 ip-172-31-62-245 sshd\[29167\]: Failed password for invalid user sammy from 45.55.214.64 port 57834 ssh2\
2020-06-18 01:04:20
59.144.139.18 attackbots
Jun 17 16:18:23 game-panel sshd[4454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.139.18
Jun 17 16:18:24 game-panel sshd[4454]: Failed password for invalid user dad from 59.144.139.18 port 42034 ssh2
Jun 17 16:22:36 game-panel sshd[4683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.144.139.18
2020-06-18 00:39:18
182.52.112.184 attackspambots
Unauthorized IMAP connection attempt
2020-06-18 00:53:51
34.201.100.55 attackbots
Lines containing failures of 34.201.100.55
Jun 17 01:43:26 zabbix sshd[119339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.201.100.55  user=r.r
Jun 17 01:43:28 zabbix sshd[119339]: Failed password for r.r from 34.201.100.55 port 34706 ssh2
Jun 17 01:43:28 zabbix sshd[119339]: Received disconnect from 34.201.100.55 port 34706:11: Bye Bye [preauth]
Jun 17 01:43:28 zabbix sshd[119339]: Disconnected from authenticating user r.r 34.201.100.55 port 34706 [preauth]
Jun 17 01:53:55 zabbix sshd[121015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.201.100.55  user=r.r
Jun 17 01:53:57 zabbix sshd[121015]: Failed password for r.r from 34.201.100.55 port 58426 ssh2
Jun 17 01:53:57 zabbix sshd[121015]: Received disconnect from 34.201.100.55 port 58426:11: Bye Bye [preauth]
Jun 17 01:53:57 zabbix sshd[121015]: Disconnected from authenticating user r.r 34.201.100.55 port 58426 [preauth]
Jun 17........
------------------------------
2020-06-18 00:27:27
51.91.77.103 attackspam
Jun 17 16:19:07 game-panel sshd[4487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.77.103
Jun 17 16:19:09 game-panel sshd[4487]: Failed password for invalid user remote from 51.91.77.103 port 34792 ssh2
Jun 17 16:22:27 game-panel sshd[4672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.77.103
2020-06-18 00:50:36
49.146.33.163 attack
Automatic report - XMLRPC Attack
2020-06-18 00:57:17
218.92.0.215 attackbots
Jun 17 16:46:37 rush sshd[23608]: Failed password for root from 218.92.0.215 port 26480 ssh2
Jun 17 16:46:56 rush sshd[23610]: Failed password for root from 218.92.0.215 port 34353 ssh2
...
2020-06-18 00:47:46

Recently Reported IPs

115.120.67.160 60.65.242.34 230.17.191.214 7.63.213.225
179.67.35.225 221.183.136.103 147.232.9.32 70.25.33.48
46.3.86.211 51.251.107.197 209.107.133.234 29.148.46.5
60.182.222.0 36.27.47.124 253.39.122.168 12.196.32.139
49.81.177.155 81.28.60.180 99.51.55.213 34.152.25.211