Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bonn

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.94.70.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.94.70.242.			IN	A

;; AUTHORITY SECTION:
.			417	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090201 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 03 05:23:24 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 242.70.94.37.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.70.94.37.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.16.140.120 attack
Jul 22 15:08:37 vegas sshd[18572]: Invalid user pi from 123.16.140.120 port 38964
Jul 22 15:08:37 vegas sshd[18573]: Invalid user pi from 123.16.140.120 port 38972
Jul 22 15:08:37 vegas sshd[18572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.140.120
Jul 22 15:08:37 vegas sshd[18573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.140.120
Jul 22 15:08:39 vegas sshd[18572]: Failed password for invalid user pi from 123.16.140.120 port 38964 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.16.140.120
2019-07-23 02:39:29
94.191.84.62 attackspambots
Attempts to probe for or exploit a Drupal 7.67 site on url: /shell.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-07-23 02:26:40
49.231.222.1 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 11:54:22,524 INFO [amun_request_handler] PortScan Detected on Port: 445 (49.231.222.1)
2019-07-23 02:17:11
106.12.127.211 attackspambots
2019-07-22T14:50:20.531266abusebot-2.cloudsearch.cf sshd\[21876\]: Invalid user chris from 106.12.127.211 port 45274
2019-07-23 02:32:53
5.39.79.48 attack
Jul 22 16:15:10 SilenceServices sshd[16902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.79.48
Jul 22 16:15:11 SilenceServices sshd[16902]: Failed password for invalid user ganesh from 5.39.79.48 port 56208 ssh2
Jul 22 16:20:29 SilenceServices sshd[22451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.79.48
2019-07-23 02:25:22
125.238.81.110 attackspam
SSH scan ::
2019-07-23 02:09:41
181.174.78.234 attack
Brute force attempt
2019-07-23 02:46:28
193.169.39.254 attackbotsspam
SSH Brute Force, server-1 sshd[32069]: Failed password for invalid user vmail from 193.169.39.254 port 50826 ssh2
2019-07-23 01:58:29
201.69.200.201 attackbots
Jul 22 20:41:51 ArkNodeAT sshd\[5949\]: Invalid user vandana from 201.69.200.201
Jul 22 20:41:51 ArkNodeAT sshd\[5949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.69.200.201
Jul 22 20:41:53 ArkNodeAT sshd\[5949\]: Failed password for invalid user vandana from 201.69.200.201 port 53188 ssh2
2019-07-23 02:48:13
185.176.26.19 attackspam
firewall-block, port(s): 9999/tcp
2019-07-23 02:07:48
162.247.74.213 attack
" "
2019-07-23 01:55:44
206.189.88.75 attack
Unauthorized SSH login attempts
2019-07-23 01:52:34
123.213.47.108 attack
Portscan or hack attempt detected by psad/fwsnort
2019-07-23 02:35:01
109.148.96.142 attack
SSH Bruteforce @ SigaVPN honeypot
2019-07-23 02:02:46
115.29.11.146 attackbotsspam
Jul 22 20:00:33 microserver sshd[18634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.146  user=root
Jul 22 20:00:35 microserver sshd[18634]: Failed password for root from 115.29.11.146 port 34756 ssh2
Jul 22 20:04:03 microserver sshd[18812]: Invalid user VM from 115.29.11.146 port 48815
Jul 22 20:04:03 microserver sshd[18812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.146
Jul 22 20:04:05 microserver sshd[18812]: Failed password for invalid user VM from 115.29.11.146 port 48815 ssh2
Jul 22 20:14:33 microserver sshd[20145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.146  user=mysql
Jul 22 20:14:35 microserver sshd[20145]: Failed password for mysql from 115.29.11.146 port 34523 ssh2
Jul 22 20:17:49 microserver sshd[20715]: Invalid user arkserver from 115.29.11.146 port 48568
Jul 22 20:17:49 microserver sshd[20715]: pam_unix(sshd:auth): authentication
2019-07-23 02:20:44

Recently Reported IPs

74.132.245.32 217.156.127.109 145.242.81.97 41.148.212.29
172.249.154.151 202.121.248.144 162.75.196.52 211.229.221.30
168.145.159.16 121.133.205.25 3.81.26.85 192.241.225.130
162.142.125.35 68.183.233.228 20.52.53.94 103.40.172.173
121.162.151.108 107.77.231.96 206.162.85.14 111.53.148.232