Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.94.146.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.94.146.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 05:18:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 14.146.94.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.146.94.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.30 attackspambots
firewall-block, port(s): 26789/tcp
2019-08-18 07:50:43
115.200.124.172 attackbotsspam
Aug 18 00:34:02 master sshd[15817]: Failed password for root from 115.200.124.172 port 32066 ssh2
Aug 18 00:34:05 master sshd[15817]: Failed password for root from 115.200.124.172 port 32066 ssh2
Aug 18 00:34:09 master sshd[15817]: Failed password for root from 115.200.124.172 port 32066 ssh2
2019-08-18 08:00:30
61.19.247.121 attackbotsspam
$f2bV_matches
2019-08-18 08:01:04
198.50.150.83 attackbots
$f2bV_matches
2019-08-18 08:05:50
177.154.43.126 attackspam
Invalid user student5 from 177.154.43.126 port 15891
2019-08-18 08:01:41
66.70.188.25 attack
Triggered by Fail2Ban at Vostok web server
2019-08-18 07:46:35
37.114.154.196 attackbots
2019-08-17T20:30:00.507061centos sshd\[17541\]: Invalid user admin from 37.114.154.196 port 60624
2019-08-17T20:30:00.513269centos sshd\[17541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.154.196
2019-08-17T20:30:02.697600centos sshd\[17541\]: Failed password for invalid user admin from 37.114.154.196 port 60624 ssh2
2019-08-18 07:23:57
165.227.41.202 attackbots
Aug 17 10:45:23 web9 sshd\[13137\]: Invalid user sim from 165.227.41.202
Aug 17 10:45:23 web9 sshd\[13137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
Aug 17 10:45:25 web9 sshd\[13137\]: Failed password for invalid user sim from 165.227.41.202 port 39336 ssh2
Aug 17 10:49:22 web9 sshd\[13964\]: Invalid user alveos from 165.227.41.202
Aug 17 10:49:22 web9 sshd\[13964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.41.202
2019-08-18 07:51:47
137.74.199.177 attackspam
Invalid user nicolas from 137.74.199.177 port 49798
2019-08-18 07:48:19
37.28.154.68 attackbotsspam
Aug 17 20:29:25 vps01 sshd[32236]: Failed password for root from 37.28.154.68 port 38203 ssh2
Aug 17 20:29:28 vps01 sshd[32236]: Failed password for root from 37.28.154.68 port 38203 ssh2
2019-08-18 08:00:15
5.39.82.197 attackspambots
Invalid user juanda from 5.39.82.197 port 37276
2019-08-18 07:33:39
190.191.194.9 attackbots
2019-08-17T23:25:29.448657abusebot-8.cloudsearch.cf sshd\[738\]: Invalid user patric from 190.191.194.9 port 47902
2019-08-18 07:37:43
192.163.197.138 attackspambots
Aug 17 23:45:36 web8 sshd\[11729\]: Invalid user report from 192.163.197.138
Aug 17 23:45:36 web8 sshd\[11729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.163.197.138
Aug 17 23:45:38 web8 sshd\[11729\]: Failed password for invalid user report from 192.163.197.138 port 42008 ssh2
Aug 17 23:50:03 web8 sshd\[13695\]: Invalid user testuser from 192.163.197.138
Aug 17 23:50:03 web8 sshd\[13695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.163.197.138
2019-08-18 07:56:36
185.176.27.106 attackspambots
08/17/2019-19:10:30.028757 185.176.27.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-18 07:47:24
103.208.220.226 attackspam
Aug 18 01:41:32 arianus sshd\[5929\]: Unable to negotiate with 103.208.220.226 port 46610: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-08-18 08:04:32

Recently Reported IPs

104.109.92.81 207.173.119.82 217.192.181.31 205.60.101.41
96.131.160.246 142.206.239.6 32.156.6.171 21.159.186.121
32.46.176.42 243.41.226.83 147.182.134.205 78.137.59.196
121.65.165.85 230.9.178.28 46.235.223.229 79.124.135.204
243.144.161.187 168.117.214.14 251.7.92.60 251.151.56.133