Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.94.94.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.94.94.29.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:02:02 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 29.94.94.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.94.94.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.28.250.66 attackspam
202.28.250.66 - - [22/Sep/2020:21:34:58 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.28.250.66 - - [22/Sep/2020:21:35:02 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
202.28.250.66 - - [22/Sep/2020:21:35:05 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-23 06:51:40
206.189.151.151 attackspam
Sep 23 00:38:28 piServer sshd[29685]: Failed password for root from 206.189.151.151 port 54420 ssh2
Sep 23 00:42:31 piServer sshd[30297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.151.151 
Sep 23 00:42:33 piServer sshd[30297]: Failed password for invalid user raul from 206.189.151.151 port 35714 ssh2
...
2020-09-23 06:56:45
111.85.90.122 attackspambots
IP 111.85.90.122 attacked honeypot on port: 1433 at 9/22/2020 10:03:38 AM
2020-09-23 06:39:24
104.211.213.191 attack
Total attacks: 4
2020-09-23 06:58:18
161.97.112.133 attackspambots
2020-09-22T23:59[Censored Hostname] sshd[23738]: Failed password for root from 161.97.112.133 port 53898 ssh2
2020-09-23T00:28[Censored Hostname] sshd[13040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi445862.contaboserver.net  user=root
2020-09-23T00:28[Censored Hostname] sshd[13040]: Failed password for root from 161.97.112.133 port 43476 ssh2[...]
2020-09-23 06:52:41
157.230.244.147 attack
Sep 23 00:47:13 vpn01 sshd[25665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.244.147
Sep 23 00:47:15 vpn01 sshd[25665]: Failed password for invalid user guest from 157.230.244.147 port 57892 ssh2
...
2020-09-23 07:04:12
85.93.20.170 attackbotsspam
1600813421 - 09/23/2020 05:23:41 Host: 85.93.20.170/85.93.20.170 Port: 3000 TCP Blocked
...
2020-09-23 06:51:18
115.207.81.103 attackspam
$f2bV_matches
2020-09-23 07:02:54
81.70.57.194 attack
Lines containing failures of 81.70.57.194
Sep 22 18:32:26 hgb10502 sshd[29276]: Invalid user cent from 81.70.57.194 port 47344
Sep 22 18:32:26 hgb10502 sshd[29276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.57.194 
Sep 22 18:32:28 hgb10502 sshd[29276]: Failed password for invalid user cent from 81.70.57.194 port 47344 ssh2
Sep 22 18:32:28 hgb10502 sshd[29276]: Received disconnect from 81.70.57.194 port 47344:11: Bye Bye [preauth]
Sep 22 18:32:28 hgb10502 sshd[29276]: Disconnected from invalid user cent 81.70.57.194 port 47344 [preauth]
Sep 22 18:43:03 hgb10502 sshd[30765]: Invalid user mysql from 81.70.57.194 port 60858
Sep 22 18:43:03 hgb10502 sshd[30765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.57.194 
Sep 22 18:43:05 hgb10502 sshd[30765]: Failed password for invalid user mysql from 81.70.57.194 port 60858 ssh2
Sep 22 18:43:06 hgb10502 sshd[30765]: Received disconn........
------------------------------
2020-09-23 06:53:46
3.135.147.246 attack
Invalid user ftpuser from 3.135.147.246 port 57506
2020-09-23 07:15:07
41.33.183.196 attackbotsspam
Unauthorized connection attempt from IP address 41.33.183.196 on Port 445(SMB)
2020-09-23 06:40:55
194.197.129.134 attackbotsspam
2020-09-22T17:03:25.698433odie.crmd.co.za postfix/smtpd[3730972]: warning: mobile-internet-c2c581-134.dhcp.inet.fi[194.197.129.134]: SASL PLAIN authentication failed: authentication failure
2020-09-22T17:03:27.687501odie.crmd.co.za postfix/smtpd[3730972]: warning: mobile-internet-c2c581-134.dhcp.inet.fi[194.197.129.134]: SASL PLAIN authentication failed: authentication failure
2020-09-22T17:03:27.988654odie.crmd.co.za postfix/smtpd[3730972]: warning: mobile-internet-c2c581-134.dhcp.inet.fi[194.197.129.134]: SASL PLAIN authentication failed: authentication failure
...
2020-09-23 07:02:24
46.101.195.156 attackspam
bruteforce detected
2020-09-23 07:05:50
106.51.98.159 attack
Sep 23 00:07:53 jane sshd[5086]: Failed password for root from 106.51.98.159 port 34446 ssh2
...
2020-09-23 06:44:33
113.169.114.119 attackbots
Sep 22 18:50:01 mail1 sshd[24303]: Did not receive identification string from 113.169.114.119 port 58241
Sep 22 18:50:06 mail1 sshd[24318]: Invalid user nagesh from 113.169.114.119 port 58958
Sep 22 18:50:06 mail1 sshd[24318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.114.119
Sep 22 18:50:08 mail1 sshd[24318]: Failed password for invalid user nagesh from 113.169.114.119 port 58958 ssh2
Sep 22 18:50:08 mail1 sshd[24318]: Connection closed by 113.169.114.119 port 58958 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.169.114.119
2020-09-23 06:40:03

Recently Reported IPs

223.155.139.218 176.241.84.30 175.107.8.126 35.177.178.216
120.28.199.240 187.140.13.49 120.193.91.186 167.61.120.102
92.124.130.159 42.114.39.207 117.174.28.160 180.242.151.36
117.201.63.149 31.210.20.173 49.130.22.100 197.231.251.24
211.236.211.126 164.90.143.6 205.209.240.157 183.220.188.141