Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kokshetau

Region: Aqmola

Country: Kazakhstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.34.95.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.34.95.94.			IN	A

;; AUTHORITY SECTION:
.			470	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023061001 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 11 11:01:32 CST 2023
;; MSG SIZE  rcvd: 103
Host info
94.95.34.5.in-addr.arpa domain name pointer client.fttb.2day.kz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
94.95.34.5.in-addr.arpa	name = client.fttb.2day.kz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.33.229 attack
$f2bV_matches
2019-08-14 02:57:21
114.113.221.162 attackspambots
$f2bV_matches
2019-08-14 02:16:47
193.77.184.2 attackbotsspam
scan z
2019-08-14 02:54:27
107.170.18.163 attack
Aug 13 14:32:48 apollo sshd\[13818\]: Invalid user plex from 107.170.18.163Aug 13 14:32:50 apollo sshd\[13818\]: Failed password for invalid user plex from 107.170.18.163 port 47041 ssh2Aug 13 14:44:04 apollo sshd\[13842\]: Invalid user cmxp from 107.170.18.163
...
2019-08-14 02:29:24
5.188.9.40 attack
My norton security blocked this attack on my Macbook three days ago, it says "web attack: formjacking".
2019-08-14 03:00:10
162.247.74.216 attackbots
Aug 13 20:31:26 heissa sshd\[19371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=phoolandevi.tor-exit.calyxinstitute.org  user=sshd
Aug 13 20:31:28 heissa sshd\[19371\]: Failed password for sshd from 162.247.74.216 port 47480 ssh2
Aug 13 20:31:32 heissa sshd\[19374\]: Invalid user sshd1 from 162.247.74.216 port 51636
Aug 13 20:31:32 heissa sshd\[19374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=phoolandevi.tor-exit.calyxinstitute.org
Aug 13 20:31:35 heissa sshd\[19374\]: Failed password for invalid user sshd1 from 162.247.74.216 port 51636 ssh2
2019-08-14 02:35:14
233.16.93.34 attackspam
Splunk® : Brute-Force login attempt on SSH:
Aug 13 14:47:42 testbed sshd[5525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=233.16.93.34.bc.googleusercontent.com
2019-08-14 02:52:04
201.247.151.51 attack
*Port Scan* detected from 201.247.151.51 (SV/El Salvador/-). 4 hits in the last 0 seconds
2019-08-14 02:19:42
139.59.94.225 attackbots
Aug 13 20:28:48 www sshd\[17181\]: Invalid user bert from 139.59.94.225 port 51534
...
2019-08-14 03:01:49
142.93.232.222 attackbots
Aug 13 21:24:40 yabzik sshd[22549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
Aug 13 21:24:43 yabzik sshd[22549]: Failed password for invalid user starbound from 142.93.232.222 port 45450 ssh2
Aug 13 21:29:32 yabzik sshd[24194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.222
2019-08-14 02:41:37
189.4.67.94 attack
Automatic report - Port Scan Attack
2019-08-14 02:59:27
158.69.63.54 attackspambots
Aug 13 20:28:41 ns41 sshd[29012]: Failed password for root from 158.69.63.54 port 42836 ssh2
Aug 13 20:28:43 ns41 sshd[29012]: Failed password for root from 158.69.63.54 port 42836 ssh2
Aug 13 20:28:46 ns41 sshd[29012]: Failed password for root from 158.69.63.54 port 42836 ssh2
Aug 13 20:28:48 ns41 sshd[29012]: Failed password for root from 158.69.63.54 port 42836 ssh2
2019-08-14 03:01:32
177.144.132.213 attackbotsspam
Aug 13 14:23:21 vps200512 sshd\[4930\]: Invalid user warner from 177.144.132.213
Aug 13 14:23:21 vps200512 sshd\[4930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.144.132.213
Aug 13 14:23:23 vps200512 sshd\[4930\]: Failed password for invalid user warner from 177.144.132.213 port 26797 ssh2
Aug 13 14:29:48 vps200512 sshd\[5104\]: Invalid user teamspeak from 177.144.132.213
Aug 13 14:29:48 vps200512 sshd\[5104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.144.132.213
2019-08-14 02:36:11
13.71.4.106 attackbotsspam
$f2bV_matches
2019-08-14 02:17:50
212.26.236.197 attackbotsspam
BURG,WP GET /wp-login.php
2019-08-14 02:26:45

Recently Reported IPs

196.172.237.23 85.232.89.39 107.170.225.27 1.1.248.43
195.42.210.145 117.153.166.107 222.92.241.159 106.195.4.117
46.97.169.74 173.82.226.100 173.82.226.64 129.45.235.29
172.59.196.79 183.83.225.72 10.113.109.3 113.24.224.234
138.186.217.81 122.46.17.227 39.211.96.199 221.110.73.92