Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Newcastle upon Tyne

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.12.136.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.12.136.187.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:16:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 187.136.12.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 187.136.12.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.119.5.70 attack
Invalid user service from 197.119.5.70 port 50015
2020-05-23 12:43:25
193.70.0.42 attackspambots
Invalid user ymy from 193.70.0.42 port 33386
2020-05-23 12:45:06
218.78.110.114 attack
Invalid user plk from 218.78.110.114 port 54066
2020-05-23 12:36:47
200.209.145.251 attackbotsspam
May 22 22:12:24 server1 sshd\[22967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.145.251 
May 22 22:12:26 server1 sshd\[22967\]: Failed password for invalid user exb from 200.209.145.251 port 26680 ssh2
May 22 22:16:33 server1 sshd\[24101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.145.251  user=lp
May 22 22:16:35 server1 sshd\[24101\]: Failed password for lp from 200.209.145.251 port 21611 ssh2
May 22 22:20:42 server1 sshd\[25249\]: Invalid user znk from 200.209.145.251
...
2020-05-23 12:42:13
51.15.46.184 attack
Invalid user wqs from 51.15.46.184 port 60640
2020-05-23 12:29:55
1.2.157.128 attackspam
Invalid user service from 1.2.157.128 port 1260
2020-05-23 12:35:07
106.13.90.133 attackbots
Invalid user vku from 106.13.90.133 port 52010
2020-05-23 12:23:03
188.254.0.160 attackbotsspam
Invalid user ggu from 188.254.0.160 port 41286
2020-05-23 12:08:15
222.186.173.215 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
Failed password for root from 222.186.173.215 port 5406 ssh2
2020-05-23 12:35:45
210.16.187.206 attackspam
Invalid user qxn from 210.16.187.206 port 52513
2020-05-23 12:39:12
1.20.196.87 attackbotsspam
Invalid user r00t from 1.20.196.87 port 65135
2020-05-23 12:34:49
202.67.46.41 attackspam
Invalid user r00t from 202.67.46.41 port 4002
2020-05-23 12:40:27
177.87.154.2 attackbots
Invalid user kvr from 177.87.154.2 port 49816
2020-05-23 12:11:32
139.99.98.248 attack
Invalid user pqm from 139.99.98.248 port 46476
2020-05-23 12:15:33
122.226.78.182 attackbots
Invalid user gxb from 122.226.78.182 port 42616
2020-05-23 12:18:31

Recently Reported IPs

163.224.196.53 133.204.80.91 75.237.178.89 89.185.77.171
215.215.49.157 231.178.82.58 123.150.43.43 59.137.14.240
228.77.38.158 181.203.43.99 41.144.197.162 215.211.119.244
9.192.123.233 3.246.107.215 230.63.105.250 133.106.181.15
5.161.192.240 91.24.223.16 108.207.78.191 226.233.72.140