Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Warsaw

Region: Mazowieckie

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.118.94.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.118.94.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025040601 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 07 09:30:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
42.94.118.34.in-addr.arpa domain name pointer 42.94.118.34.bc.googleusercontent.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.94.118.34.in-addr.arpa	name = 42.94.118.34.bc.googleusercontent.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.213.161.105 attackspambots
Automatic report - Banned IP Access
2019-10-29 12:32:45
178.128.52.97 attack
2019-10-29T03:58:36.682081abusebot-3.cloudsearch.cf sshd\[27434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.52.97  user=root
2019-10-29 12:21:32
213.32.20.107 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-10-29 12:57:08
106.13.198.32 attackbotsspam
Oct 29 05:29:08 meumeu sshd[8108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.198.32 
Oct 29 05:29:11 meumeu sshd[8108]: Failed password for invalid user qv from 106.13.198.32 port 38306 ssh2
Oct 29 05:33:55 meumeu sshd[8615]: Failed password for root from 106.13.198.32 port 47704 ssh2
...
2019-10-29 12:34:52
191.254.66.166 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/191.254.66.166/ 
 
 AU - 1H : (45)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN27699 
 
 IP : 191.254.66.166 
 
 CIDR : 191.254.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 ATTACKS DETECTED ASN27699 :  
  1H - 8 
  3H - 27 
  6H - 47 
 12H - 111 
 24H - 228 
 
 DateTime : 2019-10-29 04:58:14 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-29 12:32:29
185.220.68.232 attackbotsspam
Unauthorised access (Oct 29) SRC=185.220.68.232 LEN=52 TTL=116 ID=20023 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-29 12:34:25
217.68.212.73 attackbotsspam
slow and persistent scanner
2019-10-29 12:49:34
128.199.247.115 attackbotsspam
Oct 29 05:20:53 sd-53420 sshd\[3817\]: Invalid user ryder from 128.199.247.115
Oct 29 05:20:53 sd-53420 sshd\[3817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.115
Oct 29 05:20:55 sd-53420 sshd\[3817\]: Failed password for invalid user ryder from 128.199.247.115 port 48998 ssh2
Oct 29 05:26:08 sd-53420 sshd\[4185\]: Invalid user lois from 128.199.247.115
Oct 29 05:26:08 sd-53420 sshd\[4185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.247.115
...
2019-10-29 12:47:57
103.40.123.18 attackspam
Port scan: Attack repeated for 24 hours
2019-10-29 12:39:20
14.52.72.231 attackbots
Automatic report - Banned IP Access
2019-10-29 12:56:12
185.232.67.5 attackbotsspam
" "
2019-10-29 12:44:42
193.93.192.204 attack
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2019-10-29 12:25:33
115.79.60.104 attack
2019-10-29T03:49:16.658647shield sshd\[27484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.60.104  user=root
2019-10-29T03:49:18.323779shield sshd\[27484\]: Failed password for root from 115.79.60.104 port 45984 ssh2
2019-10-29T03:58:30.479501shield sshd\[29757\]: Invalid user always from 115.79.60.104 port 39844
2019-10-29T03:58:30.483841shield sshd\[29757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.60.104
2019-10-29T03:58:32.535483shield sshd\[29757\]: Failed password for invalid user always from 115.79.60.104 port 39844 ssh2
2019-10-29 12:24:56
175.23.106.20 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/175.23.106.20/ 
 
 CN - 1H : (739)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 175.23.106.20 
 
 CIDR : 175.16.0.0/13 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 14 
  3H - 44 
  6H - 70 
 12H - 125 
 24H - 256 
 
 DateTime : 2019-10-29 04:58:06 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-29 12:38:18
180.106.81.168 attackspam
$f2bV_matches
2019-10-29 12:25:10

Recently Reported IPs

34.118.24.72 205.169.39.14 34.118.17.1 205.169.39.7
205.169.39.37 205.169.39.26 35.216.158.128 117.36.207.137
46.58.192.213 41.84.238.47 59.82.83.93 59.82.83.143
59.82.83.106 59.82.83.119 59.82.83.216 59.82.83.207
59.82.83.82 59.82.83.187 59.82.83.134 139.226.161.247