Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.94.166.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.94.166.241.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:55:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
241.166.94.81.in-addr.arpa domain name pointer 81-94-166-241.customer.itmastaren.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.166.94.81.in-addr.arpa	name = 81-94-166-241.customer.itmastaren.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.130.55.57 attack
23/tcp
[2020-02-09]1pkt
2020-02-10 00:57:49
104.168.96.138 attackbotsspam
Feb  9 17:44:46 MK-Soft-VM8 sshd[4773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.96.138 
Feb  9 17:44:48 MK-Soft-VM8 sshd[4773]: Failed password for invalid user hwb from 104.168.96.138 port 56434 ssh2
...
2020-02-10 00:44:50
156.204.201.57 attackbotsspam
23/tcp
[2020-02-09]1pkt
2020-02-10 00:59:05
152.169.173.210 attackbots
2323/tcp
[2020-02-09]1pkt
2020-02-10 00:47:05
188.131.142.109 attackbotsspam
Feb  9 14:55:47 vpn01 sshd[27721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.142.109
Feb  9 14:55:49 vpn01 sshd[27721]: Failed password for invalid user umo from 188.131.142.109 port 43806 ssh2
...
2020-02-10 00:52:19
134.209.164.184 attack
Feb  9 16:20:19 silence02 sshd[7619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184
Feb  9 16:20:20 silence02 sshd[7619]: Failed password for invalid user jne from 134.209.164.184 port 42100 ssh2
Feb  9 16:23:38 silence02 sshd[7758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.164.184
2020-02-10 01:17:30
35.138.66.198 attackspam
Feb  9 18:32:43 hosting sshd[15442]: Invalid user tzu from 35.138.66.198 port 47836
...
2020-02-10 00:55:01
223.18.144.168 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-10 01:15:56
106.13.114.26 attack
Feb  9 06:10:13 mockhub sshd[2453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.114.26
Feb  9 06:10:15 mockhub sshd[2453]: Failed password for invalid user vji from 106.13.114.26 port 56546 ssh2
...
2020-02-10 00:43:01
187.112.73.65 attackspam
Automatic report - Port Scan Attack
2020-02-10 01:03:51
202.51.111.225 attack
Feb  9 17:27:08 mout sshd[10806]: Invalid user dum from 202.51.111.225 port 49539
2020-02-10 00:35:52
51.15.27.12 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-10 00:54:15
118.187.5.37 attackspam
Feb  9 14:28:38 icinga sshd[830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.5.37 
Feb  9 14:28:40 icinga sshd[830]: Failed password for invalid user swr from 118.187.5.37 port 59684 ssh2
Feb  9 14:35:12 icinga sshd[6864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.187.5.37 
...
2020-02-10 00:38:21
194.116.228.38 attackbotsspam
Feb  9 22:03:00 lcl-usvr-02 sshd[13182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.116.228.38  user=root
Feb  9 22:03:03 lcl-usvr-02 sshd[13182]: Failed password for root from 194.116.228.38 port 51420 ssh2
Feb  9 22:03:17 lcl-usvr-02 sshd[13290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.116.228.38  user=root
Feb  9 22:03:19 lcl-usvr-02 sshd[13290]: Failed password for root from 194.116.228.38 port 44678 ssh2
...
2020-02-10 01:14:54
128.199.75.69 attackspam
Feb  9 18:16:54 dedicated sshd[661]: Invalid user lsg from 128.199.75.69 port 40565
2020-02-10 01:18:13

Recently Reported IPs

250.246.14.108 252.180.224.26 58.119.2.90 192.232.22.30
47.249.148.134 99.72.151.29 228.53.123.171 220.183.234.217
58.180.96.96 216.221.229.13 225.145.34.91 183.199.24.251
249.217.221.102 99.131.44.37 243.187.212.52 182.185.182.149
133.27.172.179 38.128.184.155 199.20.99.244 175.37.95.70