Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.157.92.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.157.92.94.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 22:57:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 94.92.157.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.92.157.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.228.137.6 attackbotsspam
Oct  6 07:16:31 php1 sshd\[4845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.228.137.6  user=root
Oct  6 07:16:33 php1 sshd\[4845\]: Failed password for root from 45.228.137.6 port 28836 ssh2
Oct  6 07:21:07 php1 sshd\[5712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.228.137.6  user=root
Oct  6 07:21:10 php1 sshd\[5712\]: Failed password for root from 45.228.137.6 port 12057 ssh2
Oct  6 07:25:42 php1 sshd\[6603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.228.137.6  user=root
2019-10-07 01:32:18
222.186.31.46 attack
06.10.2019 11:46:08 SSH access blocked by firewall
2019-10-07 01:34:31
34.215.69.55 attack
B: /wp-login.php attack
2019-10-07 01:31:33
23.129.64.180 attackspambots
10/06/2019-18:33:41.195462 23.129.64.180 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 59
2019-10-07 01:20:43
211.75.194.80 attackbotsspam
Oct  6 17:34:06 ns41 sshd[25340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
Oct  6 17:34:06 ns41 sshd[25340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.80
2019-10-07 01:30:31
187.1.57.210 attackbots
Oct  6 04:49:51 php1 sshd\[15673\]: Invalid user Rosen from 187.1.57.210
Oct  6 04:49:51 php1 sshd\[15673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-187-1-57-210.isp.valenet.com.br
Oct  6 04:49:53 php1 sshd\[15673\]: Failed password for invalid user Rosen from 187.1.57.210 port 35116 ssh2
Oct  6 04:55:12 php1 sshd\[16706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-187-1-57-210.isp.valenet.com.br  user=root
Oct  6 04:55:13 php1 sshd\[16706\]: Failed password for root from 187.1.57.210 port 49030 ssh2
2019-10-07 01:16:22
195.16.41.171 attack
2019-10-06 15:40:57,046 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 195.16.41.171
2019-10-06 16:17:57,065 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 195.16.41.171
2019-10-06 16:55:58,255 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 195.16.41.171
2019-10-06 17:31:31,400 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 195.16.41.171
2019-10-06 18:06:46,610 fail2ban.actions        \[1778\]: NOTICE  \[sshd\] Ban 195.16.41.171
...
2019-10-07 01:15:52
103.255.147.53 attackspambots
$f2bV_matches
2019-10-07 01:17:27
104.248.30.249 attackspambots
Oct  6 18:46:19 vmanager6029 sshd\[24481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249  user=root
Oct  6 18:46:22 vmanager6029 sshd\[24481\]: Failed password for root from 104.248.30.249 port 36106 ssh2
Oct  6 18:49:49 vmanager6029 sshd\[24532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249  user=root
2019-10-07 01:12:03
166.62.80.109 attack
WordPress wp-login brute force :: 166.62.80.109 0.120 BYPASS [06/Oct/2019:22:41:36  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-07 01:23:09
23.231.38.206 attackbotsspam
Unauthorized access detected from banned ip
2019-10-07 00:52:48
128.199.52.45 attackspambots
Oct  6 14:12:12 ovpn sshd\[2448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
Oct  6 14:12:14 ovpn sshd\[2448\]: Failed password for root from 128.199.52.45 port 56970 ssh2
Oct  6 14:29:46 ovpn sshd\[6892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
Oct  6 14:29:48 ovpn sshd\[6892\]: Failed password for root from 128.199.52.45 port 57598 ssh2
Oct  6 14:34:23 ovpn sshd\[8044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45  user=root
2019-10-07 00:58:16
123.233.88.191 attackspambots
Oct  6 16:59:11 mail sshd[23664]: Invalid user pi from 123.233.88.191
Oct  6 16:59:11 mail sshd[23668]: Invalid user pi from 123.233.88.191
Oct  6 16:59:12 mail sshd[23668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.233.88.191
Oct  6 16:59:11 mail sshd[23668]: Invalid user pi from 123.233.88.191
Oct  6 16:59:14 mail sshd[23668]: Failed password for invalid user pi from 123.233.88.191 port 54604 ssh2
Oct  6 16:59:11 mail sshd[23664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.233.88.191
Oct  6 16:59:11 mail sshd[23664]: Invalid user pi from 123.233.88.191
Oct  6 16:59:14 mail sshd[23664]: Failed password for invalid user pi from 123.233.88.191 port 49585 ssh2
...
2019-10-07 01:16:46
118.89.187.136 attack
Oct  6 13:40:27 ws12vmsma01 sshd[18783]: Failed password for root from 118.89.187.136 port 55290 ssh2
Oct  6 13:45:05 ws12vmsma01 sshd[19507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.187.136  user=root
Oct  6 13:45:07 ws12vmsma01 sshd[19507]: Failed password for root from 118.89.187.136 port 35392 ssh2
...
2019-10-07 01:14:24
23.129.64.167 attack
Postfix SMTP rejection
...
2019-10-07 00:56:47

Recently Reported IPs

249.76.96.20 16.103.161.247 184.205.130.46 112.19.189.157
80.171.33.114 57.17.50.95 205.145.104.139 246.199.122.228
210.94.114.124 58.76.129.209 236.142.39.129 223.232.143.166
68.168.136.248 70.115.69.209 13.108.190.74 73.16.58.150
216.106.48.103 120.237.131.214 97.150.152.100 91.155.146.155