Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.54.197.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.54.197.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:32:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
94.197.54.219.in-addr.arpa domain name pointer softbank219054197094.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.197.54.219.in-addr.arpa	name = softbank219054197094.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.150.183 attackspam
Oct  2 15:02:48 rush sshd[16039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.150.183
Oct  2 15:02:50 rush sshd[16039]: Failed password for invalid user sampserver from 118.25.150.183 port 48784 ssh2
Oct  2 15:08:18 rush sshd[16190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.150.183
...
2020-10-03 04:27:42
144.91.118.102 attackspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ip-102-118-91-144.static.vnomi.net.
2020-10-03 04:40:14
125.121.169.12 attackbotsspam
Oct  1 20:36:27 CT3029 sshd[7768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.121.169.12  user=r.r
Oct  1 20:36:30 CT3029 sshd[7768]: Failed password for r.r from 125.121.169.12 port 35924 ssh2
Oct  1 20:36:30 CT3029 sshd[7768]: Received disconnect from 125.121.169.12 port 35924:11: Bye Bye [preauth]
Oct  1 20:36:30 CT3029 sshd[7768]: Disconnected from 125.121.169.12 port 35924 [preauth]
Oct  1 20:36:54 CT3029 sshd[7770]: Invalid user tiago from 125.121.169.12 port 39270
Oct  1 20:36:54 CT3029 sshd[7770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.121.169.12


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.121.169.12
2020-10-03 04:25:49
178.128.54.182 attack
SSH BruteForce Attack
2020-10-03 04:11:17
103.75.149.106 attack
Oct  2 20:55:49 ns3164893 sshd[17435]: Failed password for root from 103.75.149.106 port 58700 ssh2
Oct  2 21:03:51 ns3164893 sshd[17906]: Invalid user student9 from 103.75.149.106 port 33724
...
2020-10-03 04:12:49
162.243.128.133 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-03 04:16:48
218.92.0.202 attackbots
Oct  2 20:35:41 marvibiene sshd[31538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Oct  2 20:35:43 marvibiene sshd[31538]: Failed password for root from 218.92.0.202 port 30681 ssh2
Oct  2 20:35:45 marvibiene sshd[31538]: Failed password for root from 218.92.0.202 port 30681 ssh2
Oct  2 20:35:41 marvibiene sshd[31538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
Oct  2 20:35:43 marvibiene sshd[31538]: Failed password for root from 218.92.0.202 port 30681 ssh2
Oct  2 20:35:45 marvibiene sshd[31538]: Failed password for root from 218.92.0.202 port 30681 ssh2
2020-10-03 04:40:43
163.172.44.194 attack
2020-10-02T14:28:11.8671401495-001 sshd[7134]: Failed password for root from 163.172.44.194 port 44272 ssh2
2020-10-02T14:39:27.5837861495-001 sshd[7710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.44.194  user=root
2020-10-02T14:39:30.2649311495-001 sshd[7710]: Failed password for root from 163.172.44.194 port 53358 ssh2
2020-10-02T14:50:28.8228101495-001 sshd[8155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.44.194  user=root
2020-10-02T14:50:30.9164381495-001 sshd[8155]: Failed password for root from 163.172.44.194 port 34218 ssh2
2020-10-02T15:01:06.6952981495-001 sshd[8605]: Invalid user testuser from 163.172.44.194 port 43312
...
2020-10-03 04:21:45
181.48.120.220 attackspam
Invalid user bugzilla from 181.48.120.220 port 57169
2020-10-03 04:38:10
89.163.148.157 attackspam
 TCP (SYN) 89.163.148.157:20310 -> port 23, len 44
2020-10-03 04:13:44
219.136.65.109 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-03 04:24:58
1.235.192.218 attackbots
Oct  2 18:32:02 ns382633 sshd\[6339\]: Invalid user sambauser from 1.235.192.218 port 49208
Oct  2 18:32:02 ns382633 sshd\[6339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.192.218
Oct  2 18:32:05 ns382633 sshd\[6339\]: Failed password for invalid user sambauser from 1.235.192.218 port 49208 ssh2
Oct  2 18:44:49 ns382633 sshd\[8026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.192.218  user=root
Oct  2 18:44:51 ns382633 sshd\[8026\]: Failed password for root from 1.235.192.218 port 59224 ssh2
2020-10-03 04:34:11
168.232.162.2 attackbots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-03 04:21:24
157.230.42.76 attack
Oct  2 21:09:26 gw1 sshd[13229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.42.76
Oct  2 21:09:28 gw1 sshd[13229]: Failed password for invalid user mc2 from 157.230.42.76 port 37479 ssh2
...
2020-10-03 04:15:50
193.106.175.55 attackbotsspam
2020-10-02 04:05:57.692272-0500  localhost smtpd[17887]: NOQUEUE: reject: RCPT from unknown[193.106.175.55]: 554 5.7.1 Service unavailable; Client host [193.106.175.55] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL495727; from= to= proto=ESMTP helo=
2020-10-03 04:10:47

Recently Reported IPs

145.0.187.237 134.81.195.115 48.203.59.171 73.6.153.167
9.61.202.125 232.234.151.100 196.183.123.50 44.234.124.61
115.225.159.113 83.179.29.43 199.92.27.176 215.207.101.64
118.215.86.19 129.140.44.194 208.8.112.74 58.112.40.169
85.1.134.56 31.90.148.203 159.93.91.103 19.229.161.148