Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: Deutsche Telekom AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.5.45.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18181
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;217.5.45.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 11 00:18:32 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 94.45.5.217.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 94.45.5.217.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.30.212.14 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-20 17:45:38
34.217.67.66 attackbots
Oct 19 23:48:22 web1 postfix/smtpd[3396]: warning: ec2-34-217-67-66.us-west-2.compute.amazonaws.com[34.217.67.66]: SASL LOGIN authentication failed: authentication failure
...
2019-10-20 17:54:32
142.93.108.189 attack
Automatic report - Banned IP Access
2019-10-20 17:23:37
128.199.55.13 attackbots
$f2bV_matches
2019-10-20 17:50:25
119.205.220.98 attackspam
Oct 20 06:45:38 hcbbdb sshd\[5085\]: Invalid user nitin from 119.205.220.98
Oct 20 06:45:38 hcbbdb sshd\[5085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98
Oct 20 06:45:41 hcbbdb sshd\[5085\]: Failed password for invalid user nitin from 119.205.220.98 port 58558 ssh2
Oct 20 06:54:09 hcbbdb sshd\[6047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98  user=root
Oct 20 06:54:11 hcbbdb sshd\[6047\]: Failed password for root from 119.205.220.98 port 41254 ssh2
2019-10-20 17:24:26
179.176.10.193 attack
Automatic report - Port Scan Attack
2019-10-20 18:00:27
194.61.26.34 attack
Oct 20 05:08:12 host sshd\[19300\]: Invalid user admin from 194.61.26.34Oct 20 05:11:58 host sshd\[21837\]: Invalid user super from 194.61.26.34Oct 20 05:15:44 host sshd\[23124\]: Invalid user ftp from 194.61.26.34
...
2019-10-20 17:33:41
92.53.69.6 attackbotsspam
Oct 17 18:36:16 cumulus sshd[28333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6  user=r.r
Oct 17 18:36:18 cumulus sshd[28333]: Failed password for r.r from 92.53.69.6 port 39024 ssh2
Oct 17 18:36:19 cumulus sshd[28333]: Received disconnect from 92.53.69.6 port 39024:11: Bye Bye [preauth]
Oct 17 18:36:19 cumulus sshd[28333]: Disconnected from 92.53.69.6 port 39024 [preauth]
Oct 17 18:57:36 cumulus sshd[29278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6  user=r.r
Oct 17 18:57:38 cumulus sshd[29278]: Failed password for r.r from 92.53.69.6 port 60032 ssh2
Oct 17 18:57:38 cumulus sshd[29278]: Received disconnect from 92.53.69.6 port 60032:11: Bye Bye [preauth]
Oct 17 18:57:38 cumulus sshd[29278]: Disconnected from 92.53.69.6 port 60032 [preauth]
Oct 17 19:01:13 cumulus sshd[29426]: Invalid user hf from 92.53.69.6 port 43852
Oct 17 19:01:13 cumulus sshd[29426]: pam........
-------------------------------
2019-10-20 17:42:03
212.154.86.139 attack
Oct 18 15:40:32 heissa sshd\[13348\]: Invalid user opc from 212.154.86.139 port 57348
Oct 18 15:40:32 heissa sshd\[13348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
Oct 18 15:40:34 heissa sshd\[13348\]: Failed password for invalid user opc from 212.154.86.139 port 57348 ssh2
Oct 18 15:44:53 heissa sshd\[14005\]: Invalid user cm from 212.154.86.139 port 40782
Oct 18 15:44:53 heissa sshd\[14005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.154.86.139
2019-10-20 17:28:35
118.122.196.104 attackbotsspam
Oct 20 11:10:30 dev0-dcde-rnet sshd[8447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.122.196.104
Oct 20 11:10:31 dev0-dcde-rnet sshd[8447]: Failed password for invalid user tester from 118.122.196.104 port 2790 ssh2
Oct 20 11:21:02 dev0-dcde-rnet sshd[8483]: Failed password for root from 118.122.196.104 port 2792 ssh2
2019-10-20 18:01:43
192.42.116.17 attackspam
Oct 20 07:58:12 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2Oct 20 07:58:15 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2Oct 20 07:58:17 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2Oct 20 07:58:20 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2Oct 20 07:58:23 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2Oct 20 07:58:25 rotator sshd\[5842\]: Failed password for root from 192.42.116.17 port 54016 ssh2
...
2019-10-20 17:28:52
89.208.22.137 attackspam
[portscan] Port scan
2019-10-20 17:40:44
91.134.143.140 attackbots
" "
2019-10-20 17:32:26
129.28.115.92 attackbots
Oct 19 20:45:35 php1 sshd\[1075\]: Invalid user xin38512101 from 129.28.115.92
Oct 19 20:45:35 php1 sshd\[1075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
Oct 19 20:45:37 php1 sshd\[1075\]: Failed password for invalid user xin38512101 from 129.28.115.92 port 45291 ssh2
Oct 19 20:50:50 php1 sshd\[1491\]: Invalid user 123456mima from 129.28.115.92
Oct 19 20:50:50 php1 sshd\[1491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.115.92
2019-10-20 17:32:01
199.249.230.78 attackspambots
B: zzZZzz blocked content access
2019-10-20 17:55:36

Recently Reported IPs

42.124.171.84 114.237.109.230 157.206.161.44 183.8.153.8
62.32.93.185 178.198.123.181 2002:dff3:80d5::dff3:80d5 41.215.129.145
180.113.99.48 194.131.21.59 67.169.168.94 179.204.103.194
1.209.179.141 204.136.110.224 223.18.105.85 116.12.153.63
192.241.220.128 219.83.121.237 207.134.172.63 215.14.62.163