Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.117.142.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.117.142.202.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:40:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 202.142.117.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.142.117.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
74.97.19.201 attackspambots
Apr 15 12:11:58 shared-1 sshd\[14441\]: Invalid user pi from 74.97.19.201Apr 15 12:11:58 shared-1 sshd\[14440\]: Invalid user pi from 74.97.19.201
...
2020-04-15 21:45:55
112.85.42.178 attackspam
04/15/2020-09:14:41.628555 112.85.42.178 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-15 21:16:33
189.240.4.201 attackbotsspam
Brute-force attempt banned
2020-04-15 21:05:09
222.186.175.167 attackspambots
Apr 15 15:05:33 server sshd[465]: Failed none for root from 222.186.175.167 port 5188 ssh2
Apr 15 15:05:36 server sshd[465]: Failed password for root from 222.186.175.167 port 5188 ssh2
Apr 15 15:05:40 server sshd[465]: Failed password for root from 222.186.175.167 port 5188 ssh2
2020-04-15 21:06:14
187.235.135.85 attackspam
Unauthorized connection attempt detected from IP address 187.235.135.85 to port 8080
2020-04-15 21:35:56
36.232.116.178 attack
postfix (unknown user, SPF fail or relay access denied)
2020-04-15 21:35:29
164.68.112.178 attackbots
1586956110 - 04/15/2020 20:08:30 Host: ip-178-112-68-164.static.contabo.net/164.68.112.178 Port: 8080 TCP Blocked
...
2020-04-15 21:19:35
14.29.214.91 attackspam
Apr 15 13:57:48 ns392434 sshd[8959]: Invalid user king from 14.29.214.91 port 45703
Apr 15 13:57:48 ns392434 sshd[8959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.91
Apr 15 13:57:48 ns392434 sshd[8959]: Invalid user king from 14.29.214.91 port 45703
Apr 15 13:57:50 ns392434 sshd[8959]: Failed password for invalid user king from 14.29.214.91 port 45703 ssh2
Apr 15 14:07:45 ns392434 sshd[9346]: Invalid user office1 from 14.29.214.91 port 37373
Apr 15 14:07:45 ns392434 sshd[9346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.214.91
Apr 15 14:07:45 ns392434 sshd[9346]: Invalid user office1 from 14.29.214.91 port 37373
Apr 15 14:07:47 ns392434 sshd[9346]: Failed password for invalid user office1 from 14.29.214.91 port 37373 ssh2
Apr 15 14:12:02 ns392434 sshd[9489]: Invalid user info from 14.29.214.91 port 58731
2020-04-15 21:42:00
91.206.14.169 attackspambots
Apr 15 20:04:54 f sshd\[31589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.206.14.169
Apr 15 20:04:57 f sshd\[31589\]: Failed password for invalid user test from 91.206.14.169 port 52192 ssh2
Apr 15 20:12:02 f sshd\[31741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.206.14.169
...
2020-04-15 21:39:07
104.14.29.2 attackspam
Apr 15 12:03:03 localhost sshd[38659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104-14-29-2.lightspeed.austtx.sbcglobal.net  user=root
Apr 15 12:03:05 localhost sshd[38659]: Failed password for root from 104.14.29.2 port 41775 ssh2
Apr 15 12:07:48 localhost sshd[39283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104-14-29-2.lightspeed.austtx.sbcglobal.net  user=root
Apr 15 12:07:50 localhost sshd[39283]: Failed password for root from 104.14.29.2 port 36827 ssh2
Apr 15 12:12:20 localhost sshd[39839]: Invalid user adidas from 104.14.29.2 port 60110
...
2020-04-15 21:26:15
85.209.0.57 attackspambots
slow and persistent scanner
2020-04-15 21:46:11
31.129.68.164 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-04-15 21:07:02
189.146.161.239 attackspambots
Honeypot attack, port: 81, PTR: dsl-189-146-161-239-dyn.prod-infinitum.com.mx.
2020-04-15 21:42:28
170.210.83.116 attackbotsspam
Apr 15 14:29:35 vps58358 sshd\[23066\]: Invalid user ftpuser from 170.210.83.116Apr 15 14:29:38 vps58358 sshd\[23066\]: Failed password for invalid user ftpuser from 170.210.83.116 port 39694 ssh2Apr 15 14:31:31 vps58358 sshd\[23077\]: Invalid user zu from 170.210.83.116Apr 15 14:31:33 vps58358 sshd\[23077\]: Failed password for invalid user zu from 170.210.83.116 port 36416 ssh2Apr 15 14:33:26 vps58358 sshd\[23099\]: Invalid user bc4j from 170.210.83.116Apr 15 14:33:28 vps58358 sshd\[23099\]: Failed password for invalid user bc4j from 170.210.83.116 port 33138 ssh2
...
2020-04-15 21:34:12
192.3.177.213 attack
'Fail2Ban'
2020-04-15 21:18:02

Recently Reported IPs

251.179.8.15 173.3.227.7 41.2.20.229 55.124.166.87
35.224.2.217 240.229.135.79 118.197.189.168 185.18.78.145
134.32.124.60 93.201.35.81 139.219.120.204 39.28.85.22
243.46.19.54 146.102.30.36 83.167.121.217 248.17.246.201
58.254.49.34 159.63.226.75 251.57.201.28 160.238.129.200