Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.48.2.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.48.2.94.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:35:26 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 94.2.48.234.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.2.48.234.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.90.139 attackbots
$f2bV_matches
2020-05-01 12:58:27
123.13.203.67 attackspam
May  1 01:30:08 firewall sshd[14337]: Invalid user cpy from 123.13.203.67
May  1 01:30:09 firewall sshd[14337]: Failed password for invalid user cpy from 123.13.203.67 port 12581 ssh2
May  1 01:38:48 firewall sshd[14634]: Invalid user emre from 123.13.203.67
...
2020-05-01 12:53:40
159.65.30.66 attackbotsspam
Invalid user su from 159.65.30.66 port 60252
2020-05-01 13:09:34
177.139.136.73 attack
Invalid user joyce from 177.139.136.73 port 57604
2020-05-01 12:52:33
191.235.91.156 attackbots
May  1 06:17:41 server sshd[12815]: Failed password for invalid user minecraft from 191.235.91.156 port 44064 ssh2
May  1 06:34:11 server sshd[16501]: Failed password for root from 191.235.91.156 port 59718 ssh2
May  1 06:49:19 server sshd[20042]: Failed password for invalid user ubuntu from 191.235.91.156 port 48430 ssh2
2020-05-01 13:28:45
177.152.124.21 attackspambots
ssh brute force
2020-05-01 13:06:49
186.235.60.18 attack
Invalid user test from 186.235.60.18 port 39280
2020-05-01 13:06:18
106.12.82.80 attackspambots
Apr 30 23:42:53 askasleikir sshd[4384]: Failed password for root from 106.12.82.80 port 44266 ssh2
Apr 30 23:38:40 askasleikir sshd[4362]: Failed password for invalid user site from 106.12.82.80 port 50442 ssh2
Apr 30 23:31:15 askasleikir sshd[4327]: Failed password for root from 106.12.82.80 port 49710 ssh2
2020-05-01 13:00:11
123.30.149.76 attackbotsspam
Invalid user wh from 123.30.149.76 port 34089
2020-05-01 12:59:03
209.97.160.105 attack
Invalid user mf from 209.97.160.105 port 61818
2020-05-01 13:02:57
106.13.172.200 attack
Invalid user vps from 106.13.172.200 port 57322
2020-05-01 13:15:43
207.46.235.70 attackbotsspam
Invalid user tracy from 207.46.235.70 port 60066
2020-05-01 13:25:01
167.172.150.111 attackbotsspam
Invalid user rabbitmq from 167.172.150.111 port 41908
2020-05-01 12:53:12
222.173.12.98 attackbots
Invalid user bexx from 222.173.12.98 port 62228
2020-05-01 13:22:23
138.68.148.177 attackspam
Invalid user lorien from 138.68.148.177 port 49856
2020-05-01 13:11:01

Recently Reported IPs

149.232.79.67 143.227.183.171 40.175.213.51 66.118.240.154
108.212.192.137 243.244.24.38 206.165.185.47 159.194.2.249
58.232.140.137 254.91.233.69 64.80.192.242 184.224.127.70
116.46.110.107 197.34.161.240 39.65.7.118 24.56.249.203
88.88.45.136 130.198.11.163 34.148.71.22 7.125.238.157