Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.121.36.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.121.36.125.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 22:14:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 125.36.121.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.36.121.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.110.16 attackspambots
Sep  1 01:42:45 microserver sshd[55248]: Invalid user med from 165.22.110.16 port 48220
Sep  1 01:42:45 microserver sshd[55248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.16
Sep  1 01:42:47 microserver sshd[55248]: Failed password for invalid user med from 165.22.110.16 port 48220 ssh2
Sep  1 01:47:12 microserver sshd[55842]: Invalid user felipe from 165.22.110.16 port 37106
Sep  1 01:47:12 microserver sshd[55842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.16
Sep  1 02:00:22 microserver sshd[57642]: Invalid user tim from 165.22.110.16 port 60236
Sep  1 02:00:22 microserver sshd[57642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.16
Sep  1 02:00:24 microserver sshd[57642]: Failed password for invalid user tim from 165.22.110.16 port 60236 ssh2
Sep  1 02:04:58 microserver sshd[57873]: Invalid user registry from 165.22.110.16 port 49126
Sep  1 02
2019-09-01 07:22:03
85.119.150.246 attackbots
Lines containing failures of 85.119.150.246
Aug 31 15:19:02 myhost sshd[2700]: Invalid user jon from 85.119.150.246 port 44114
Aug 31 15:19:02 myhost sshd[2700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.119.150.246
Aug 31 15:19:04 myhost sshd[2700]: Failed password for invalid user jon from 85.119.150.246 port 44114 ssh2
Aug 31 15:19:04 myhost sshd[2700]: Received disconnect from 85.119.150.246 port 44114:11: Bye Bye [preauth]
Aug 31 15:19:04 myhost sshd[2700]: Disconnected from invalid user jon 85.119.150.246 port 44114 [preauth]
Aug 31 15:34:05 myhost sshd[2718]: Invalid user wednesday from 85.119.150.246 port 52028
Aug 31 15:34:05 myhost sshd[2718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.119.150.246
Aug 31 15:34:07 myhost sshd[2718]: Failed password for invalid user wednesday from 85.119.150.246 port 52028 ssh2
Aug 31 15:34:07 myhost sshd[2718]: Received disconnect fr........
------------------------------
2019-09-01 07:10:33
177.132.64.172 attack
Automatic report - Port Scan Attack
2019-09-01 07:15:45
119.196.83.30 attackspam
2019-08-31T21:52:36.084149abusebot-4.cloudsearch.cf sshd\[31385\]: Invalid user testuser from 119.196.83.30 port 51088
2019-09-01 07:01:43
117.4.24.21 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-31 20:38:10,557 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.4.24.21)
2019-09-01 06:56:58
68.183.105.52 attackspambots
Aug 31 22:22:20 hb sshd\[5793\]: Invalid user samba from 68.183.105.52
Aug 31 22:22:20 hb sshd\[5793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.52
Aug 31 22:22:22 hb sshd\[5793\]: Failed password for invalid user samba from 68.183.105.52 port 53520 ssh2
Aug 31 22:31:40 hb sshd\[6582\]: Invalid user admin from 68.183.105.52
Aug 31 22:31:40 hb sshd\[6582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.105.52
2019-09-01 07:15:09
104.211.216.173 attack
Sep  1 00:41:55 vps691689 sshd[30811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
Sep  1 00:41:57 vps691689 sshd[30811]: Failed password for invalid user best from 104.211.216.173 port 38620 ssh2
...
2019-09-01 06:53:19
31.208.65.235 attackbots
Automated report - ssh fail2ban:
Sep 1 01:21:48 authentication failure 
Sep 1 01:21:50 wrong password, user=ubuntu, port=33338, ssh2
Sep 1 01:25:46 authentication failure
2019-09-01 07:37:46
51.75.142.177 attackspam
Sep  1 00:12:46 ncomp sshd[13278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.142.177  user=root
Sep  1 00:12:48 ncomp sshd[13278]: Failed password for root from 51.75.142.177 port 52304 ssh2
Sep  1 00:19:26 ncomp sshd[13355]: Invalid user csgoserver from 51.75.142.177
2019-09-01 06:56:39
188.166.220.17 attackbotsspam
Aug 31 23:03:08 www_kotimaassa_fi sshd[14575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.220.17
Aug 31 23:03:10 www_kotimaassa_fi sshd[14575]: Failed password for invalid user grayson from 188.166.220.17 port 45116 ssh2
...
2019-09-01 07:19:13
138.68.4.175 attackspambots
Aug 31 13:06:31 wbs sshd\[15379\]: Invalid user xue from 138.68.4.175
Aug 31 13:06:31 wbs sshd\[15379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.175
Aug 31 13:06:33 wbs sshd\[15379\]: Failed password for invalid user xue from 138.68.4.175 port 49528 ssh2
Aug 31 13:10:30 wbs sshd\[15842\]: Invalid user ftp_user from 138.68.4.175
Aug 31 13:10:30 wbs sshd\[15842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.175
2019-09-01 07:26:00
59.72.103.230 attackbots
Aug 31 12:50:32 hanapaa sshd\[6294\]: Invalid user mktg1 from 59.72.103.230
Aug 31 12:50:32 hanapaa sshd\[6294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.103.230
Aug 31 12:50:34 hanapaa sshd\[6294\]: Failed password for invalid user mktg1 from 59.72.103.230 port 45583 ssh2
Aug 31 12:53:42 hanapaa sshd\[6561\]: Invalid user mauro from 59.72.103.230
Aug 31 12:53:42 hanapaa sshd\[6561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.103.230
2019-09-01 06:59:32
137.74.47.22 attackspam
Aug 31 18:55:56 plusreed sshd[14898]: Invalid user anish from 137.74.47.22
...
2019-09-01 07:04:04
51.77.140.111 attackbotsspam
Aug 31 23:48:40 SilenceServices sshd[30025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
Aug 31 23:48:43 SilenceServices sshd[30025]: Failed password for invalid user vncuser from 51.77.140.111 port 42782 ssh2
Aug 31 23:52:27 SilenceServices sshd[380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.111
2019-09-01 07:11:15
129.204.39.194 attackbotsspam
$f2bV_matches
2019-09-01 07:10:48

Recently Reported IPs

171.228.85.51 39.208.196.21 49.178.93.171 5.137.114.131
107.167.24.10 253.118.23.228 61.151.153.155 161.159.69.100
153.135.227.95 13.231.42.226 31.101.152.94 132.87.240.156
139.71.195.32 16.149.220.15 250.224.38.57 123.143.131.32
249.89.172.14 204.241.55.251 90.203.71.201 94.29.185.135