Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.45.37.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6553
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.45.37.94.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051402 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 13:02:48 CST 2019
;; MSG SIZE  rcvd: 115

Host info
94.37.45.81.in-addr.arpa domain name pointer 94.red-81-45-37.staticip.rima-tde.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
94.37.45.81.in-addr.arpa	name = 94.red-81-45-37.staticip.rima-tde.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
5.135.182.84 attack
Jun 10 20:15:16 server sshd\[174745\]: Invalid user ftpuser from 5.135.182.84
Jun 10 20:15:16 server sshd\[174745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.182.84
Jun 10 20:15:18 server sshd\[174745\]: Failed password for invalid user ftpuser from 5.135.182.84 port 41220 ssh2
...
2019-08-21 15:37:34
148.70.218.43 attackbotsspam
$f2bV_matches
2019-08-21 16:02:14
62.234.109.203 attackbotsspam
Aug 21 09:06:04 v22019058497090703 sshd[20724]: Failed password for root from 62.234.109.203 port 54160 ssh2
Aug 21 09:11:37 v22019058497090703 sshd[21296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.203
Aug 21 09:11:39 v22019058497090703 sshd[21296]: Failed password for invalid user vikky from 62.234.109.203 port 49058 ssh2
...
2019-08-21 16:04:55
51.75.23.242 attackbots
Invalid user alex from 51.75.23.242 port 54968
2019-08-21 15:47:00
199.195.248.177 attack
2019-08-15T13:46:57.713265wiz-ks3 sshd[8877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.248.177  user=root
2019-08-15T13:46:59.557230wiz-ks3 sshd[8877]: Failed password for root from 199.195.248.177 port 49708 ssh2
2019-08-15T13:47:03.408182wiz-ks3 sshd[8877]: Failed password for root from 199.195.248.177 port 49708 ssh2
2019-08-15T13:46:57.713265wiz-ks3 sshd[8877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.248.177  user=root
2019-08-15T13:46:59.557230wiz-ks3 sshd[8877]: Failed password for root from 199.195.248.177 port 49708 ssh2
2019-08-15T13:47:03.408182wiz-ks3 sshd[8877]: Failed password for root from 199.195.248.177 port 49708 ssh2
2019-08-15T13:46:57.713265wiz-ks3 sshd[8877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.248.177  user=root
2019-08-15T13:46:59.557230wiz-ks3 sshd[8877]: Failed password for root from 199.195.248.177 port 49708 ssh2
2
2019-08-21 15:21:44
174.138.56.93 attackbotsspam
[ssh] SSH attack
2019-08-21 16:13:48
1.209.171.64 attackbotsspam
Aug 21 12:58:51 areeb-Workstation sshd\[16980\]: Invalid user backuppc from 1.209.171.64
Aug 21 12:58:51 areeb-Workstation sshd\[16980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64
Aug 21 12:58:53 areeb-Workstation sshd\[16980\]: Failed password for invalid user backuppc from 1.209.171.64 port 33158 ssh2
...
2019-08-21 15:57:04
128.106.195.126 attackspam
SSH bruteforce
2019-08-21 15:37:13
89.248.162.168 attackbotsspam
firewall-block, port(s): 2267/tcp, 2270/tcp, 2278/tcp
2019-08-21 15:39:34
180.168.198.142 attackbots
May 12 08:59:59 server sshd\[118184\]: Invalid user tomcat from 180.168.198.142
May 12 08:59:59 server sshd\[118184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.198.142
May 12 09:00:01 server sshd\[118184\]: Failed password for invalid user tomcat from 180.168.198.142 port 51710 ssh2
...
2019-08-21 15:49:35
196.46.36.144 attackbotsspam
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:07.734472wiz-ks3 sshd[6677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T02:52:07.732487wiz-ks3 sshd[6677]: Invalid user react from 196.46.36.144 port 34946
2019-07-31T02:52:09.852360wiz-ks3 sshd[6677]: Failed password for invalid user react from 196.46.36.144 port 34946 ssh2
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:35.555967wiz-ks3 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.46.36.144
2019-07-31T03:06:35.553859wiz-ks3 sshd[6737]: Invalid user ozrt from 196.46.36.144 port 33137
2019-07-31T03:06:37.502978wiz-ks3 sshd[6737]: Failed password for invalid user ozrt from 196.46.36.144 port 33137 ssh2
2019-07-31T03:20:58.952843wiz-ks3 sshd[6765]: Invalid user paula from 196.46.36.144 port 59547
2019-07-31T03:20
2019-08-21 15:31:18
185.176.27.30 attack
Port scan on 3 port(s): 23488 23489 24289
2019-08-21 16:01:40
112.166.1.227 attack
SSH Brute Force
2019-08-21 15:59:04
183.47.47.134 attackspambots
2019-08-21T02:02:50.005511abusebot.cloudsearch.cf sshd\[20731\]: Invalid user debian from 183.47.47.134 port 47686
2019-08-21 15:25:49
188.166.236.211 attackbots
Aug 21 03:28:40 vps200512 sshd\[6319\]: Invalid user fourjs from 188.166.236.211
Aug 21 03:28:40 vps200512 sshd\[6319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
Aug 21 03:28:41 vps200512 sshd\[6319\]: Failed password for invalid user fourjs from 188.166.236.211 port 51978 ssh2
Aug 21 03:34:21 vps200512 sshd\[6501\]: Invalid user 1234 from 188.166.236.211
Aug 21 03:34:21 vps200512 sshd\[6501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
2019-08-21 15:39:12

Recently Reported IPs

0.20.135.179 27.2.225.26 66.96.233.24 23.89.133.197
139.255.18.4 14.98.95.226 117.220.228.2 38.21.45.57
13.156.2.162 85.172.98.94 160.153.153.156 106.51.1.191
112.220.151.204 202.51.178.126 188.235.61.20 238.54.163.61
142.129.23.119 104.152.52.67 5.200.64.54 129.205.210.90