Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brugherio

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.94.201.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.94.201.244.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 15:39:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
244.201.94.5.in-addr.arpa domain name pointer net-5-94-201-244.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.201.94.5.in-addr.arpa	name = net-5-94-201-244.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
137.103.161.110 spamattackproxy
IDK this device
2020-10-04 02:02:34
112.85.42.237 attackbotsspam
Oct  3 13:49:30 NPSTNNYC01T sshd[23087]: Failed password for root from 112.85.42.237 port 15659 ssh2
Oct  3 13:50:26 NPSTNNYC01T sshd[23128]: Failed password for root from 112.85.42.237 port 17765 ssh2
Oct  3 13:50:28 NPSTNNYC01T sshd[23128]: Failed password for root from 112.85.42.237 port 17765 ssh2
...
2020-10-04 02:00:41
179.96.62.29 attackspam
20/10/2@16:36:20: FAIL: Alarm-Network address from=179.96.62.29
...
2020-10-04 02:09:47
156.195.125.115 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-10-04 02:19:52
115.133.237.161 attackbots
Oct  3 17:38:33 vps647732 sshd[22510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.133.237.161
Oct  3 17:38:35 vps647732 sshd[22510]: Failed password for invalid user oscar from 115.133.237.161 port 38838 ssh2
...
2020-10-04 02:26:59
183.131.249.58 attack
Oct  3 15:01:46 srv-ubuntu-dev3 sshd[78060]: Invalid user media from 183.131.249.58
Oct  3 15:01:46 srv-ubuntu-dev3 sshd[78060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.249.58
Oct  3 15:01:46 srv-ubuntu-dev3 sshd[78060]: Invalid user media from 183.131.249.58
Oct  3 15:01:49 srv-ubuntu-dev3 sshd[78060]: Failed password for invalid user media from 183.131.249.58 port 36428 ssh2
Oct  3 15:06:44 srv-ubuntu-dev3 sshd[78632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.249.58  user=root
Oct  3 15:06:46 srv-ubuntu-dev3 sshd[78632]: Failed password for root from 183.131.249.58 port 36977 ssh2
Oct  3 15:11:35 srv-ubuntu-dev3 sshd[79129]: Invalid user postgres from 183.131.249.58
Oct  3 15:11:35 srv-ubuntu-dev3 sshd[79129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.249.58
Oct  3 15:11:35 srv-ubuntu-dev3 sshd[79129]: Invalid user postgr
...
2020-10-04 02:12:03
34.80.223.251 attackspambots
Invalid user test1 from 34.80.223.251 port 47244
2020-10-04 02:19:40
190.210.182.179 attackbots
Oct  3 17:12:44 ip-172-31-16-56 sshd\[27514\]: Invalid user sammy from 190.210.182.179\
Oct  3 17:12:46 ip-172-31-16-56 sshd\[27514\]: Failed password for invalid user sammy from 190.210.182.179 port 52752 ssh2\
Oct  3 17:15:23 ip-172-31-16-56 sshd\[27533\]: Invalid user backups from 190.210.182.179\
Oct  3 17:15:25 ip-172-31-16-56 sshd\[27533\]: Failed password for invalid user backups from 190.210.182.179 port 42185 ssh2\
Oct  3 17:17:59 ip-172-31-16-56 sshd\[27550\]: Invalid user csgo from 190.210.182.179\
2020-10-04 02:30:03
103.100.209.118 attackspambots
Oct  3 09:46:31 ns382633 sshd\[15833\]: Invalid user yun from 103.100.209.118 port 51172
Oct  3 09:46:31 ns382633 sshd\[15833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.118
Oct  3 09:46:32 ns382633 sshd\[15833\]: Failed password for invalid user yun from 103.100.209.118 port 51172 ssh2
Oct  3 09:53:50 ns382633 sshd\[16512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.118  user=root
Oct  3 09:53:51 ns382633 sshd\[16512\]: Failed password for root from 103.100.209.118 port 34806 ssh2
2020-10-04 02:23:18
195.158.26.238 attackspambots
Oct  3 19:34:26  sshd\[1147\]: Invalid user db2fenc1 from 195.158.26.238Oct  3 19:34:28  sshd\[1147\]: Failed password for invalid user db2fenc1 from 195.158.26.238 port 50434 ssh2
...
2020-10-04 01:52:13
45.148.234.125 attackspambots
(mod_security) mod_security (id:210730) triggered by 45.148.234.125 (RU/Russia/-): 5 in the last 300 secs
2020-10-04 02:31:09
111.68.98.152 attackbotsspam
(sshd) Failed SSH login from 111.68.98.152 (PK/Pakistan/111.68.98.152.pern.pk): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 13:13:07 optimus sshd[11456]: Invalid user tim from 111.68.98.152
Oct  3 13:13:07 optimus sshd[11456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152 
Oct  3 13:13:08 optimus sshd[11456]: Failed password for invalid user tim from 111.68.98.152 port 52728 ssh2
Oct  3 13:18:04 optimus sshd[12999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.98.152  user=root
Oct  3 13:18:05 optimus sshd[12999]: Failed password for root from 111.68.98.152 port 42010 ssh2
2020-10-04 02:09:33
203.151.81.77 attack
Invalid user ubuntu from 203.151.81.77 port 58012
2020-10-04 01:59:50
45.55.65.92 attack
 TCP (SYN) 45.55.65.92:55907 -> port 24092, len 44
2020-10-04 02:11:02
68.134.118.57 attack
$f2bV_matches
2020-10-04 02:17:23

Recently Reported IPs

103.31.38.148 5.67.79.33 5.151.60.176 5.65.239.226
5.65.120.56 51.210.45.188 5.128.77.19 5.81.166.244
137.226.2.113 137.226.1.150 137.226.1.162 137.226.1.167
5.167.64.13 137.226.1.88 130.190.142.220 137.226.1.84
5.80.242.120 94.16.116.81 5.80.189.148 5.71.228.69