Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
94.102.52.36 attackspam
Sent packet to closed port: 22
2020-08-09 23:44:48
94.102.52.57 attackbots
[Thu May 21 12:06:10 2020] - DDoS Attack From IP: 94.102.52.57 Port: 56548
2020-07-09 03:53:58
94.102.52.44 attackspambots
May 27 00:05:26 pop3-login: Info: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=94.102.52.44, lip=192.168.100.101, session=\<9W41QJSmrABeZjQs\>\
May 27 00:47:06 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.52.44, lip=192.168.100.101, session=\\
May 27 00:50:24 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.52.44, lip=192.168.100.101, session=\\
May 27 00:59:20 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.52.44, lip=192.168.100.101, session=\\
May 27 00:59:24 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=94.102.52.44, lip=192.168.100.101, session=\\
May 27 01
2020-05-27 07:46:46
94.102.52.44 attackspam
May 26 18:59:50 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.52.44, lip=185.118.198.210, session=
May 26 19:00:07 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.52.44, lip=185.118.198.210, session=<0DPwBpCmxk5eZjQs>
May 26 19:00:19 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=94.102.52.44, lip=185.118.198.210, session=
May 26 19:01:43 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=94.102.52.44, lip=185.118.198.210, session=
May 26 19:02:11 web01.agentur-b-2.de dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=
2020-05-27 01:15:11
94.102.52.44 attack
May 26 04:04:28 ns3042688 courier-pop3d: LOGIN FAILED, user=postmaster@sikla-shop.eu, ip=\[::ffff:94.102.52.44\]
...
2020-05-26 10:11:53
94.102.52.44 attackbotsspam
May 25 19:44:30 ns3042688 courier-pop3d: LOGIN FAILED, user=office@sikla-systems.es, ip=\[::ffff:94.102.52.44\]
...
2020-05-26 02:06:54
94.102.52.44 attackbotsspam
May 25 07:48:22 ns3042688 courier-pop3d: LOGIN FAILED, user=test@makita-dolmar.info, ip=\[::ffff:94.102.52.44\]
...
2020-05-25 13:49:29
94.102.52.57 attackbotsspam
05/24/2020-18:33:20.532373 94.102.52.57 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-25 06:51:24
94.102.52.44 attackbotsspam
May 24 13:56:10 ns3042688 courier-pop3d: LOGIN FAILED, user=webmaster@tienda-sikla.eu, ip=\[::ffff:94.102.52.44\]
...
2020-05-24 20:15:14
94.102.52.57 attack
Port scanning [23 denied]
2020-05-23 17:57:54
94.102.52.44 attack
May 22 21:47:50 ns3042688 courier-pop3d: LOGIN FAILED, user=reception@tienda-cmt.org, ip=\[::ffff:94.102.52.44\]
...
2020-05-23 03:49:51
94.102.52.44 attackbots
May 22 13:47:30 ns3042688 courier-pop3d: LOGIN FAILED, user=support@sikla-shop.eu, ip=\[::ffff:94.102.52.44\]
...
2020-05-22 19:54:43
94.102.52.57 attack
TCP ports : 11 / 338 / 448 / 564 / 911
2020-05-22 01:22:15
94.102.52.57 attackspambots
05/20/2020-13:13:08.646937 94.102.52.57 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-21 01:31:46
94.102.52.44 attackbotsspam
May 20 18:50:14 ns3042688 courier-pop3d: LOGIN FAILED, user=info@tienda-cmt.com, ip=\[::ffff:94.102.52.44\]
...
2020-05-21 00:57:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.102.52.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.102.52.80.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 15:33:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 80.52.102.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 80.52.102.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.63.8.108 attackbots
Unauthorized connection attempt detected from IP address 47.63.8.108 to port 2220 [J]
2020-01-06 19:21:39
119.28.239.205 attack
Unauthorized connection attempt detected from IP address 119.28.239.205 to port 2086 [J]
2020-01-06 19:12:41
180.150.189.206 attack
Unauthorized connection attempt detected from IP address 180.150.189.206 to port 2220 [J]
2020-01-06 19:35:28
185.136.192.238 attack
Unauthorized connection attempt detected from IP address 185.136.192.238 to port 8080 [J]
2020-01-06 19:33:06
77.42.86.68 attackbots
Unauthorized connection attempt detected from IP address 77.42.86.68 to port 23 [J]
2020-01-06 19:46:11
220.71.235.120 attackspam
Unauthorized connection attempt detected from IP address 220.71.235.120 to port 23
2020-01-06 19:26:23
76.109.130.255 attackbotsspam
Unauthorized connection attempt detected from IP address 76.109.130.255 to port 5555 [J]
2020-01-06 19:46:32
87.248.0.82 attackbots
Unauthorized connection attempt detected from IP address 87.248.0.82 to port 22 [J]
2020-01-06 19:45:06
88.248.206.23 attackspam
Unauthorized connection attempt detected from IP address 88.248.206.23 to port 4567 [J]
2020-01-06 19:17:13
212.174.53.165 attackspambots
Unauthorized connection attempt detected from IP address 212.174.53.165 to port 23 [J]
2020-01-06 19:27:18
36.46.142.80 attackspambots
Unauthorized connection attempt detected from IP address 36.46.142.80 to port 2220 [J]
2020-01-06 19:23:58
77.43.74.58 attackbots
Unauthorized connection attempt detected from IP address 77.43.74.58 to port 2220 [J]
2020-01-06 19:45:37
123.241.39.132 attack
Unauthorized connection attempt detected from IP address 123.241.39.132 to port 22 [J]
2020-01-06 19:38:42
200.187.164.198 attackbots
Unauthorized connection attempt detected from IP address 200.187.164.198 to port 23 [J]
2020-01-06 19:28:56
51.254.51.182 attackspam
Jan  6 12:42:14 srv206 sshd[28080]: Invalid user www from 51.254.51.182
Jan  6 12:42:14 srv206 sshd[28080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip182.ip-51-254-51.eu
Jan  6 12:42:14 srv206 sshd[28080]: Invalid user www from 51.254.51.182
Jan  6 12:42:18 srv206 sshd[28080]: Failed password for invalid user www from 51.254.51.182 port 34352 ssh2
...
2020-01-06 19:48:30

Recently Reported IPs

176.119.7.41 89.248.167.215 94.102.63.172 94.102.59.214
94.102.61.136 94.102.60.44 94.102.59.126 94.102.61.193
185.153.198.18 104.160.190.96 137.226.168.8 137.226.138.53
94.102.55.145 180.76.208.139 94.102.61.247 94.102.55.122
94.102.60.161 137.226.137.21 94.102.60.208 94.102.61.199