Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.219.94.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.219.94.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 27 07:30:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 207.94.219.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.94.219.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.141.208 attackbotsspam
Jul 13 20:24:09 debian sshd\[28076\]: Invalid user chico from 159.203.141.208 port 37430
Jul 13 20:24:10 debian sshd\[28076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.141.208
...
2019-07-14 05:44:01
140.143.208.42 attackbots
Jul 13 21:44:52 animalibera sshd[29482]: Invalid user testuser from 140.143.208.42 port 58476
...
2019-07-14 05:50:50
109.49.220.101 attackspambots
Lines containing failures of 109.49.220.101
Jul 13 16:54:06 mellenthin postfix/smtpd[5323]: connect from a109-49-220-101.cpe.netcabo.pt[109.49.220.101]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.49.220.101
2019-07-14 05:22:05
159.89.182.194 attackspambots
Automatic report - Banned IP Access
2019-07-14 05:40:58
182.65.110.205 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-14 05:48:23
203.195.178.83 attackbotsspam
Jul 13 17:58:50 localhost sshd\[2460\]: Invalid user hans from 203.195.178.83 port 10009
Jul 13 17:58:50 localhost sshd\[2460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.178.83
...
2019-07-14 05:26:59
193.32.163.182 attackbotsspam
Jul 13 23:27:10 MK-Soft-Root1 sshd\[21870\]: Invalid user admin from 193.32.163.182 port 52418
Jul 13 23:27:10 MK-Soft-Root1 sshd\[21870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Jul 13 23:27:12 MK-Soft-Root1 sshd\[21870\]: Failed password for invalid user admin from 193.32.163.182 port 52418 ssh2
...
2019-07-14 05:39:35
218.92.0.199 attack
Jul 13 21:41:16 animalibera sshd[28603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Jul 13 21:41:18 animalibera sshd[28603]: Failed password for root from 218.92.0.199 port 64219 ssh2
...
2019-07-14 05:56:48
193.142.42.200 spam
Lifestyle Daily. Revolutionary portable air conditioner is breaking sales records.
2019-07-14 05:27:52
92.114.94.150 attackbots
Probing for vulnerable PHP code /wp-includes/Text/gcnwizja.php
2019-07-14 05:37:05
139.59.59.194 attackspam
Jul 13 21:08:29 herz-der-gamer sshd[27566]: Failed password for invalid user albatros from 139.59.59.194 port 43366 ssh2
...
2019-07-14 06:00:23
81.130.234.235 attack
Jul 13 22:38:13 amit sshd\[12208\]: Invalid user mmm from 81.130.234.235
Jul 13 22:38:13 amit sshd\[12208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.234.235
Jul 13 22:38:15 amit sshd\[12208\]: Failed password for invalid user mmm from 81.130.234.235 port 44880 ssh2
...
2019-07-14 05:45:09
132.255.143.67 attack
Lines containing failures of 132.255.143.67
Jul 13 05:50:22 mellenthin postfix/smtpd[14658]: warning: hostname 132.255.143.67.masternetrs.com.br does not resolve to address 132.255.143.67: Name or service not known
Jul 13 05:50:22 mellenthin postfix/smtpd[14658]: connect from unknown[132.255.143.67]
Jul x@x
Jul 13 05:50:23 mellenthin postfix/smtpd[14658]: lost connection after DATA from unknown[132.255.143.67]
Jul 13 05:50:23 mellenthin postfix/smtpd[14658]: disconnect from unknown[132.255.143.67] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4
Jul 13 16:54:57 mellenthin postfix/smtpd[31568]: warning: hostname 132.255.143.67.masternetrs.com.br does not resolve to address 132.255.143.67: Name or service not known
Jul 13 16:54:57 mellenthin postfix/smtpd[31568]: connect from unknown[132.255.143.67]
Jul x@x
Jul 13 16:54:59 mellenthin postfix/smtpd[31568]: lost connection after DATA from unknown[132.255.143.67]
Jul 13 16:54:59 mellenthin postfix/smtpd[31568]: disconnect from un........
------------------------------
2019-07-14 06:05:44
159.65.13.203 attack
Jul 13 22:39:29 srv-4 sshd\[6664\]: Invalid user theforest from 159.65.13.203
Jul 13 22:39:29 srv-4 sshd\[6664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
Jul 13 22:39:31 srv-4 sshd\[6664\]: Failed password for invalid user theforest from 159.65.13.203 port 52576 ssh2
...
2019-07-14 05:56:04
104.236.175.127 attackbotsspam
Jul 13 22:45:31 *** sshd[11931]: Failed password for invalid user cactiuser from 104.236.175.127 port 58948 ssh2
Jul 13 22:55:45 *** sshd[11997]: Failed password for invalid user gitolite3 from 104.236.175.127 port 38820 ssh2
Jul 13 23:01:01 *** sshd[12062]: Failed password for invalid user mt from 104.236.175.127 port 40410 ssh2
Jul 13 23:06:00 *** sshd[12150]: Failed password for invalid user elk from 104.236.175.127 port 42004 ssh2
Jul 13 23:11:12 *** sshd[12248]: Failed password for invalid user marwan from 104.236.175.127 port 43596 ssh2
Jul 13 23:16:23 *** sshd[12280]: Failed password for invalid user oracle from 104.236.175.127 port 45192 ssh2
Jul 13 23:21:24 *** sshd[12344]: Failed password for invalid user admin from 104.236.175.127 port 46782 ssh2
Jul 13 23:26:38 *** sshd[12437]: Failed password for invalid user elasticsearch from 104.236.175.127 port 48384 ssh2
Jul 13 23:31:48 *** sshd[12479]: Failed password for invalid user admin from 104.236.175.127 port 49974 ssh2
Jul 13 23:36:49 *** sshd[12558
2019-07-14 05:23:37

Recently Reported IPs

8.222.132.167 8.219.254.207 47.236.30.80 47.236.25.81
47.236.231.160 47.236.228.128 47.236.227.180 8.222.150.111
8.222.188.104 8.222.160.146 8.219.51.100 8.219.242.247
8.219.208.193 47.236.37.213 47.236.231.122 47.236.20.82
59.82.135.55 20.64.105.124 59.82.83.88 59.82.83.40