Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: Deutsche Telekom AG

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.5.45.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18181
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;217.5.45.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 11 00:18:32 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 94.45.5.217.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 94.45.5.217.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.17.96.170 attack
8443/tcp 8000/tcp 8081/tcp...
[2019-07-26/09-24]53pkt,11pt.(tcp),1pt.(udp)
2019-09-25 18:09:59
35.185.0.203 attackbotsspam
Sep 25 07:05:36 www sshd\[34318\]: Invalid user Admin from 35.185.0.203Sep 25 07:05:38 www sshd\[34318\]: Failed password for invalid user Admin from 35.185.0.203 port 42826 ssh2Sep 25 07:09:37 www sshd\[34542\]: Invalid user prnath from 35.185.0.203Sep 25 07:09:39 www sshd\[34542\]: Failed password for invalid user prnath from 35.185.0.203 port 55544 ssh2
...
2019-09-25 17:57:19
180.127.77.94 attackbots
Sep 25 05:48:15 server postfix/smtpd[32696]: NOQUEUE: reject: RCPT from unknown[180.127.77.94]: 554 5.7.1 Service unavailable; Client host [180.127.77.94] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/180.127.77.94 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-09-25 18:18:46
222.186.173.180 attackspambots
Sep 25 12:20:44 SilenceServices sshd[11590]: Failed password for root from 222.186.173.180 port 26380 ssh2
Sep 25 12:20:48 SilenceServices sshd[11590]: Failed password for root from 222.186.173.180 port 26380 ssh2
Sep 25 12:20:53 SilenceServices sshd[11590]: Failed password for root from 222.186.173.180 port 26380 ssh2
Sep 25 12:20:57 SilenceServices sshd[11590]: Failed password for root from 222.186.173.180 port 26380 ssh2
2019-09-25 18:27:24
49.88.112.116 attackspambots
Sep 25 07:21:54 mout sshd[10726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Sep 25 07:21:57 mout sshd[10726]: Failed password for root from 49.88.112.116 port 13340 ssh2
2019-09-25 18:08:47
85.204.246.178 attackbotsspam
2019-09-25T10:23:39.586354abusebot-6.cloudsearch.cf sshd\[12607\]: Invalid user bk from 85.204.246.178 port 35474
2019-09-25 18:25:23
142.93.198.152 attackbots
2019-09-25T02:06:38.0815031495-001 sshd\[30092\]: Failed password for invalid user admin from 142.93.198.152 port 41114 ssh2
2019-09-25T02:18:43.8669711495-001 sshd\[30926\]: Invalid user informix from 142.93.198.152 port 46744
2019-09-25T02:18:43.8745061495-001 sshd\[30926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152
2019-09-25T02:18:45.8994481495-001 sshd\[30926\]: Failed password for invalid user informix from 142.93.198.152 port 46744 ssh2
2019-09-25T02:22:35.1899921495-001 sshd\[31239\]: Invalid user la from 142.93.198.152 port 58030
2019-09-25T02:22:35.1966541495-001 sshd\[31239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152
...
2019-09-25 18:12:53
139.59.41.154 attackspam
Sep 25 09:33:57 localhost sshd\[30615\]: Invalid user steam from 139.59.41.154 port 39482
Sep 25 09:33:57 localhost sshd\[30615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
Sep 25 09:33:59 localhost sshd\[30615\]: Failed password for invalid user steam from 139.59.41.154 port 39482 ssh2
2019-09-25 18:30:24
217.182.79.245 attack
Sep 25 07:53:33 apollo sshd\[31755\]: Invalid user cz from 217.182.79.245Sep 25 07:53:35 apollo sshd\[31755\]: Failed password for invalid user cz from 217.182.79.245 port 33686 ssh2Sep 25 08:15:35 apollo sshd\[31817\]: Invalid user rendhy from 217.182.79.245
...
2019-09-25 18:15:39
139.155.69.51 attackbotsspam
Sep 25 12:35:34 server sshd\[20895\]: Invalid user uy from 139.155.69.51 port 38390
Sep 25 12:35:34 server sshd\[20895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.51
Sep 25 12:35:36 server sshd\[20895\]: Failed password for invalid user uy from 139.155.69.51 port 38390 ssh2
Sep 25 12:40:50 server sshd\[2220\]: Invalid user weblogic from 139.155.69.51 port 49480
Sep 25 12:40:50 server sshd\[2220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.69.51
2019-09-25 17:59:16
49.149.4.178 attackspambots
19/9/24@23:47:56: FAIL: Alarm-Intrusion address from=49.149.4.178
...
2019-09-25 18:33:10
172.94.53.139 attackbots
Sep 25 10:59:50 www4 sshd\[63352\]: Invalid user ny from 172.94.53.139
Sep 25 10:59:50 www4 sshd\[63352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.139
Sep 25 10:59:52 www4 sshd\[63352\]: Failed password for invalid user ny from 172.94.53.139 port 35632 ssh2
...
2019-09-25 17:58:47
183.181.98.53 attackbotsspam
Scanning and Vuln Attempts
2019-09-25 18:06:11
118.238.4.201 attackbotsspam
Automatic report - Banned IP Access
2019-09-25 18:05:12
173.239.139.38 attackbots
Invalid user ts3server from 173.239.139.38 port 57510
2019-09-25 18:04:54

Recently Reported IPs

42.124.171.84 114.237.109.230 157.206.161.44 183.8.153.8
62.32.93.185 178.198.123.181 2002:dff3:80d5::dff3:80d5 41.215.129.145
180.113.99.48 194.131.21.59 67.169.168.94 179.204.103.194
1.209.179.141 204.136.110.224 223.18.105.85 116.12.153.63
192.241.220.128 219.83.121.237 207.134.172.63 215.14.62.163