Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.114.18.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.114.18.54.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092800 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 28 19:42:13 CST 2019
;; MSG SIZE  rcvd: 116
Host info
54.18.114.94.in-addr.arpa domain name pointer ip-94-114-18-54.unity-media.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.18.114.94.in-addr.arpa	name = ip-94-114-18-54.unity-media.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.211.117.47 attack
Nov  1 05:47:05 vps666546 sshd\[27187\]: Invalid user hema420 from 129.211.117.47 port 33972
Nov  1 05:47:05 vps666546 sshd\[27187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.117.47
Nov  1 05:47:08 vps666546 sshd\[27187\]: Failed password for invalid user hema420 from 129.211.117.47 port 33972 ssh2
Nov  1 05:50:59 vps666546 sshd\[27255\]: Invalid user 123456 from 129.211.117.47 port 52614
Nov  1 05:50:59 vps666546 sshd\[27255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.117.47
...
2019-11-01 17:53:22
185.176.27.170 attackspambots
Nov  1 09:56:00   TCP Attack: SRC=185.176.27.170 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=243  PROTO=TCP SPT=52214 DPT=54683 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-01 18:07:57
220.170.193.112 attackspam
$f2bV_matches
2019-11-01 18:09:44
177.205.190.224 attackspam
firewall-block, port(s): 23/tcp
2019-11-01 17:40:23
2.49.47.188 attackspam
Automatic report - Banned IP Access
2019-11-01 17:45:13
193.93.195.53 attack
Automatic report - Banned IP Access
2019-11-01 17:43:25
220.133.196.17 attackbots
scan z
2019-11-01 17:34:14
45.161.80.141 attack
Honeypot attack, port: 23, PTR: 45-161-80-141.sinaldoceu.com.br.
2019-11-01 17:51:40
159.192.107.27 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-01 17:40:42
51.91.212.81 attackspambots
11/01/2019-09:47:15.254854 51.91.212.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 53
2019-11-01 17:51:05
185.36.219.150 attackbots
slow and persistent scanner
2019-11-01 17:54:27
14.207.13.222 attackspam
2019-11-01T04:50:14.6823061240 sshd\[27897\]: Invalid user ubnt from 14.207.13.222 port 60391
2019-11-01T04:50:14.8890651240 sshd\[27897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.207.13.222
2019-11-01T04:50:16.4920951240 sshd\[27897\]: Failed password for invalid user ubnt from 14.207.13.222 port 60391 ssh2
...
2019-11-01 17:39:49
122.227.185.101 attack
firewall-block, port(s): 445/tcp
2019-11-01 17:44:32
61.8.69.98 attackbotsspam
ssh failed login
2019-11-01 17:49:19
183.154.48.153 attackspam
$f2bV_matches
2019-11-01 17:56:13

Recently Reported IPs

50.7.32.172 185.219.132.207 14.173.202.200 113.110.199.153
91.203.146.86 125.56.20.80 142.93.212.168 119.173.116.237
168.235.86.207 197.43.74.138 172.93.205.162 112.231.195.203
103.136.187.42 27.121.64.130 88.225.213.91 42.200.117.201
178.151.213.140 175.139.199.53 39.52.52.214 15.125.254.186