Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newbury

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.1.57.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.1.57.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 15:47:21 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 40.57.1.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.57.1.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.127.110.233 attack
TW_MAINT-TW-TWNIC_<177>1592568671 [1:2403388:58121] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 45 [Classification: Misc Attack] [Priority: 2]:  {TCP} 59.127.110.233:2083
2020-06-20 03:54:13
89.36.210.121 attackspam
SSH brutforce
2020-06-20 03:29:01
46.101.248.180 attackspam
SSH brute force attempt
2020-06-20 04:04:25
49.235.141.203 attackbotsspam
Jun 19 13:54:18 gestao sshd[25411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.141.203 
Jun 19 13:54:20 gestao sshd[25411]: Failed password for invalid user informix from 49.235.141.203 port 35434 ssh2
Jun 19 13:58:11 gestao sshd[25553]: Failed password for root from 49.235.141.203 port 50636 ssh2
...
2020-06-20 03:44:29
49.234.39.194 attackbots
SSHD unauthorised connection attempt (b)
2020-06-20 03:50:45
103.123.8.75 attackspam
Jun 19 14:07:37 OPSO sshd\[5752\]: Invalid user csserver from 103.123.8.75 port 48924
Jun 19 14:07:37 OPSO sshd\[5752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
Jun 19 14:07:40 OPSO sshd\[5752\]: Failed password for invalid user csserver from 103.123.8.75 port 48924 ssh2
Jun 19 14:11:09 OPSO sshd\[6414\]: Invalid user sam from 103.123.8.75 port 42998
Jun 19 14:11:09 OPSO sshd\[6414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
2020-06-20 03:53:40
198.143.133.156 attackbotsspam
firewall-block, port(s): 44818/tcp
2020-06-20 03:52:45
106.13.203.171 attack
Jun 19 21:43:53 ns37 sshd[15009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.171
Jun 19 21:43:55 ns37 sshd[15009]: Failed password for invalid user admindb from 106.13.203.171 port 31456 ssh2
Jun 19 21:47:10 ns37 sshd[16142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.171
2020-06-20 03:56:58
61.189.43.58 attack
Jun 19 14:27:54 home sshd[26400]: Failed password for root from 61.189.43.58 port 57536 ssh2
Jun 19 14:30:24 home sshd[26667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.189.43.58
Jun 19 14:30:26 home sshd[26667]: Failed password for invalid user usuario from 61.189.43.58 port 55106 ssh2
...
2020-06-20 03:38:16
118.68.94.115 attack
Jun 19 14:10:52 debian-2gb-nbg1-2 kernel: \[14827341.559413\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=118.68.94.115 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=49 ID=22235 PROTO=TCP SPT=4096 DPT=81 WINDOW=12088 RES=0x00 SYN URGP=0
2020-06-20 04:03:33
68.99.85.62 attack
2020-06-19T19:12:12.585511  sshd[32432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.99.85.62  user=root
2020-06-19T19:12:14.331668  sshd[32432]: Failed password for root from 68.99.85.62 port 40588 ssh2
2020-06-19T19:19:14.334926  sshd[32602]: Invalid user teamspeak3 from 68.99.85.62 port 42362
...
2020-06-20 03:43:16
134.175.119.208 attack
2020-06-19T12:29:28.135046mail.csmailer.org sshd[14521]: Failed password for invalid user soldat from 134.175.119.208 port 48532 ssh2
2020-06-19T12:33:32.642600mail.csmailer.org sshd[15433]: Invalid user ubuntu from 134.175.119.208 port 48198
2020-06-19T12:33:32.649464mail.csmailer.org sshd[15433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.119.208
2020-06-19T12:33:32.642600mail.csmailer.org sshd[15433]: Invalid user ubuntu from 134.175.119.208 port 48198
2020-06-19T12:33:35.029832mail.csmailer.org sshd[15433]: Failed password for invalid user ubuntu from 134.175.119.208 port 48198 ssh2
...
2020-06-20 03:35:04
83.240.242.218 attack
Jun 19 19:26:35 vpn01 sshd[27089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.242.218
Jun 19 19:26:37 vpn01 sshd[27089]: Failed password for invalid user sgyuri from 83.240.242.218 port 45984 ssh2
...
2020-06-20 03:48:32
128.199.123.0 attack
Invalid user zhanghw from 128.199.123.0 port 49086
2020-06-20 03:59:09
51.178.78.153 attack
SmallBizIT.US 3 packets to tcp(161,992,6009)
2020-06-20 03:46:32

Recently Reported IPs

193.139.39.69 203.121.65.34 225.66.87.245 223.225.93.93
190.173.128.176 120.44.174.60 89.175.96.164 71.237.45.11
21.4.11.2 90.11.156.178 149.83.170.145 138.15.225.160
210.35.211.52 114.219.57.58 6.141.118.7 215.13.251.245
166.172.157.183 137.71.218.28 104.251.42.74 69.162.175.171