Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.94.174.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46137
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.94.174.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:21:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.174.94.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.174.94.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.87.212.38 attackbots
Dec 27 07:39:30 debian-2gb-nbg1-2 kernel: \[1081494.955951\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.87.212.38 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=TCP SPT=57686 DPT=60001 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-27 22:23:20
45.134.203.176 attack
firewall-block, port(s): 23/tcp
2019-12-27 22:07:32
185.56.187.112 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/185.56.187.112/ 
 
 NO - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NO 
 NAME ASN : ASN60130 
 
 IP : 185.56.187.112 
 
 CIDR : 185.56.186.0/23 
 
 PREFIX COUNT : 3 
 
 UNIQUE IP COUNT : 1024 
 
 
 ATTACKS DETECTED ASN60130 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-12-27 07:19:15 
 
 INFO : Potentially Bad Traffic Scan Detected and Blocked by ADMIN  - data recovery
2019-12-27 22:36:43
45.116.232.24 attack
firewall-block, port(s): 445/tcp
2019-12-27 22:10:25
185.156.73.60 attackbotsspam
Dec 27 15:18:29 debian-2gb-nbg1-2 kernel: \[1109032.577906\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=45409 PROTO=TCP SPT=54074 DPT=49432 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-27 22:27:25
167.71.214.37 attackbotsspam
Dec 27 13:07:47 MK-Soft-Root1 sshd[24503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.214.37 
Dec 27 13:07:50 MK-Soft-Root1 sshd[24503]: Failed password for invalid user server from 167.71.214.37 port 55284 ssh2
...
2019-12-27 22:16:15
42.243.30.188 attackbots
Scanning
2019-12-27 22:25:52
111.23.134.221 attackbots
Scanning
2019-12-27 22:03:00
80.14.253.7 attackbots
Dec 27 11:32:08 DAAP sshd[25744]: Invalid user yoyo from 80.14.253.7 port 33738
Dec 27 11:32:08 DAAP sshd[25744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.14.253.7
Dec 27 11:32:08 DAAP sshd[25744]: Invalid user yoyo from 80.14.253.7 port 33738
Dec 27 11:32:10 DAAP sshd[25744]: Failed password for invalid user yoyo from 80.14.253.7 port 33738 ssh2
Dec 27 11:38:10 DAAP sshd[25797]: Invalid user skew from 80.14.253.7 port 39604
...
2019-12-27 22:39:45
211.169.249.156 attackspam
Invalid user fallang from 211.169.249.156 port 60340
2019-12-27 22:01:00
71.122.164.51 attack
proto=tcp  .  spt=56071  .  dpt=25  .     (Found on   Dark List de Dec 27)     (245)
2019-12-27 22:28:12
139.199.100.81 attackspam
Repeated failed SSH attempt
2019-12-27 22:34:09
111.206.87.230 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-12-27 22:13:56
104.248.147.78 attackspam
12/27/2019-12:17:23.805585 104.248.147.78 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-12-27 22:37:35
54.37.67.144 attackbotsspam
Dec 27 02:58:50 server sshd\[21539\]: Failed password for invalid user test from 54.37.67.144 port 33056 ssh2
Dec 27 14:53:50 server sshd\[11212\]: Invalid user economic from 54.37.67.144
Dec 27 14:53:50 server sshd\[11212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.ip-54-37-67.eu 
Dec 27 14:53:52 server sshd\[11212\]: Failed password for invalid user economic from 54.37.67.144 port 44770 ssh2
Dec 27 15:44:55 server sshd\[21170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.ip-54-37-67.eu  user=mysql
...
2019-12-27 22:39:02

Recently Reported IPs

172.252.62.52 243.62.0.241 143.164.244.58 2.222.10.97
73.152.92.113 3.98.82.30 215.48.38.91 64.15.51.180
217.65.150.116 133.151.15.25 147.0.213.1 80.83.138.145
56.35.116.242 213.7.183.74 248.249.242.129 50.185.151.99
251.39.89.249 141.75.107.163 38.82.240.53 213.26.146.122