Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.20.194.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.20.194.95.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052301 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 13:43:26 CST 2023
;; MSG SIZE  rcvd: 104
Host info
95.194.20.5.in-addr.arpa domain name pointer data-194-95.cgates.lt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
95.194.20.5.in-addr.arpa	name = data-194-95.cgates.lt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
191.8.126.87 attackspambots
SMB Server BruteForce Attack
2019-10-12 21:54:42
186.201.185.122 attackbotsspam
19/10/12@01:50:54: FAIL: Alarm-Intrusion address from=186.201.185.122
...
2019-10-12 21:51:39
95.90.142.55 attackspambots
Oct 12 14:35:06 XXX sshd[59825]: Invalid user brz from 95.90.142.55 port 54330
2019-10-12 22:04:18
177.25.54.114 attackbotsspam
SMB Server BruteForce Attack
2019-10-12 21:52:08
187.99.255.18 attack
SMB Server BruteForce Attack
2019-10-12 21:52:50
168.181.179.142 attack
" "
2019-10-12 21:38:54
151.80.60.151 attackbotsspam
Oct 12 12:09:22 SilenceServices sshd[11927]: Failed password for root from 151.80.60.151 port 34734 ssh2
Oct 12 12:13:30 SilenceServices sshd[13050]: Failed password for root from 151.80.60.151 port 46280 ssh2
2019-10-12 21:34:37
14.248.83.163 attackspambots
Oct 12 13:46:05 OPSO sshd\[18679\]: Invalid user Pharm@2017 from 14.248.83.163 port 33858
Oct 12 13:46:05 OPSO sshd\[18679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163
Oct 12 13:46:07 OPSO sshd\[18679\]: Failed password for invalid user Pharm@2017 from 14.248.83.163 port 33858 ssh2
Oct 12 13:50:37 OPSO sshd\[19630\]: Invalid user June123 from 14.248.83.163 port 44606
Oct 12 13:50:37 OPSO sshd\[19630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163
2019-10-12 21:46:55
121.14.17.168 attackspambots
firewall-block, port(s): 445/tcp
2019-10-12 22:09:50
222.186.30.165 attackbotsspam
12.10.2019 13:23:03 SSH access blocked by firewall
2019-10-12 21:41:12
177.68.29.219 attackbotsspam
SMB Server BruteForce Attack
2019-10-12 21:36:06
49.79.222.170 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/49.79.222.170/ 
 CN - 1H : (504)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 49.79.222.170 
 
 CIDR : 49.79.192.0/19 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 13 
  3H - 25 
  6H - 52 
 12H - 98 
 24H - 220 
 
 DateTime : 2019-10-12 07:50:55 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-12 21:51:26
128.199.138.31 attackspam
Oct 12 10:42:16 vps01 sshd[4940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31
Oct 12 10:42:18 vps01 sshd[4940]: Failed password for invalid user P@$$W00RD@2017 from 128.199.138.31 port 58811 ssh2
2019-10-12 21:45:16
185.128.41.50 attackspam
404 NOT FOUND
2019-10-12 22:16:03
118.25.98.75 attackspam
Automatic report - Banned IP Access
2019-10-12 22:17:16

Recently Reported IPs

7.171.42.244 159.170.60.221 18.138.230.126 95.228.92.37
146.23.163.149 86.248.114.59 94.29.82.16 220.114.151.255
81.149.127.106 67.25.129.42 104.248.229.14 45.44.229.50
8.47.169.250 211.231.191.181 102.103.182.4 63.59.237.223
220.94.62.35 225.75.228.106 106.210.131.141 18.88.125.144