Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lanzhou

Region: Gansu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.94.203.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30491
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.94.203.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 01:32:37 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 54.203.94.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 54.203.94.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.91.131.49 attackspambots
Unauthorized connection attempt from IP address 36.91.131.49 on Port 445(SMB)
2019-09-06 09:12:58
187.1.57.210 attackbots
DATE:2019-09-05 21:03:32, IP:187.1.57.210, PORT:ssh SSH brute force auth (ermes)
2019-09-06 09:04:36
177.190.192.190 attackspam
$f2bV_matches
2019-09-06 09:16:00
91.204.227.89 attack
1,54-00/00 [bc01/m26] concatform PostRequest-Spammer scoring: maputo01_x2b
2019-09-06 08:44:26
118.89.149.71 attackbots
webserver:80 [05/Sep/2019]  "GET /webdav/ HTTP/1.1" 404 360 "-" "Mozilla/5.0"
2019-09-06 08:50:17
185.175.93.14 attackbots
firewall-block, port(s): 7800/tcp
2019-09-06 08:38:57
193.107.112.237 attackbots
Unauthorized connection attempt from IP address 193.107.112.237 on Port 445(SMB)
2019-09-06 09:06:03
89.210.45.91 attack
Telnet Server BruteForce Attack
2019-09-06 08:52:02
114.67.66.199 attackbotsspam
SSH Brute-Force attacks
2019-09-06 08:55:54
114.37.198.130 attackspam
Unauthorized connection attempt from IP address 114.37.198.130 on Port 445(SMB)
2019-09-06 09:16:25
66.249.65.140 attackbotsspam
Automatic report - Banned IP Access
2019-09-06 09:20:56
165.22.63.29 attackspambots
Sep  5 20:44:02 plusreed sshd[31218]: Invalid user odoo from 165.22.63.29
...
2019-09-06 08:55:19
125.124.152.133 attack
Sep  5 20:38:31 ny01 sshd[26900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.152.133
Sep  5 20:38:33 ny01 sshd[26900]: Failed password for invalid user sinusbot from 125.124.152.133 port 52684 ssh2
Sep  5 20:43:32 ny01 sshd[27743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.152.133
2019-09-06 08:53:48
71.6.135.131 attackspambots
09/05/2019-17:47:20.960631 71.6.135.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-09-06 09:20:35
106.51.0.199 attack
Unauthorized connection attempt from IP address 106.51.0.199 on Port 445(SMB)
2019-09-06 08:57:32

Recently Reported IPs

224.134.129.14 16.10.225.142 194.28.92.254 64.164.7.213
99.73.216.109 212.11.242.45 108.93.232.76 133.194.154.109
58.83.192.219 60.68.119.194 146.163.38.221 74.215.28.14
59.28.37.255 180.126.235.104 18.202.151.218 24.212.135.142
121.61.205.183 120.58.212.7 58.20.139.5 176.157.127.153