Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.130.196.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.130.196.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:44:32 CST 2025
;; MSG SIZE  rcvd: 107
Host info
194.196.130.94.in-addr.arpa domain name pointer static.194.196.130.94.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.196.130.94.in-addr.arpa	name = static.194.196.130.94.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.54.142.84 attackbots
$f2bV_matches
2019-11-22 21:04:09
223.215.18.49 attack
badbot
2019-11-22 21:12:46
182.61.48.209 attackspam
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2019-11-22 21:20:15
78.124.172.164 attackspambots
Nov 22 07:19:39 localhost sshd\[6057\]: Invalid user admin from 78.124.172.164
Nov 22 07:19:39 localhost sshd\[6057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.124.172.164
Nov 22 07:19:40 localhost sshd\[6057\]: Failed password for invalid user admin from 78.124.172.164 port 40122 ssh2
Nov 22 07:19:58 localhost sshd\[6070\]: Invalid user ubuntu from 78.124.172.164
Nov 22 07:19:58 localhost sshd\[6070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.124.172.164
...
2019-11-22 21:02:15
121.57.167.131 attackbots
badbot
2019-11-22 20:48:50
46.38.144.17 attackspambots
Nov 22 13:59:21 webserver postfix/smtpd\[17851\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 13:59:59 webserver postfix/smtpd\[17851\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 14:00:35 webserver postfix/smtpd\[17280\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 14:01:13 webserver postfix/smtpd\[17280\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 22 14:01:50 webserver postfix/smtpd\[17280\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-22 21:07:06
27.70.153.187 attackspam
Invalid user admin from 27.70.153.187 port 36924
2019-11-22 21:03:01
46.105.99.163 attack
Automatic report - Banned IP Access
2019-11-22 21:16:07
118.24.158.42 attackspam
F2B jail: sshd. Time: 2019-11-22 08:49:43, Reported by: VKReport
2019-11-22 21:06:43
184.75.211.132 attackbots
(From cisneros.hildegard@yahoo.com) Looking for effective online marketing that isn't completely full of it? Sorry to bug you on your contact form but actually that was kinda the point. We can send your promotional text to websites via their contact pages just like you're reading this note right now. You can specify targets by keyword or just fire off bulk blasts to sites in any country you choose. So let's say you need to blast an ad to all the mortgage brokers in the USA, we'll scrape websites for only those and post your ad message to them. As long as you're advertising a product or service that's relevant to that type of business then your business will get awesome results! 

Write a quickie email to evie2535gre@gmail.com to get details about how we do this
2019-11-22 20:54:40
36.4.84.170 attack
badbot
2019-11-22 20:52:14
41.224.59.78 attackspam
Nov 22 09:31:16 svp-01120 sshd[20024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.59.78
Nov 22 09:31:16 svp-01120 sshd[20024]: Invalid user nh from 41.224.59.78
Nov 22 09:31:18 svp-01120 sshd[20024]: Failed password for invalid user nh from 41.224.59.78 port 35520 ssh2
Nov 22 09:35:23 svp-01120 sshd[24348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.59.78  user=backup
Nov 22 09:35:25 svp-01120 sshd[24348]: Failed password for backup from 41.224.59.78 port 43200 ssh2
...
2019-11-22 20:37:43
106.13.162.75 attackbots
SSH invalid-user multiple login attempts
2019-11-22 20:43:30
113.117.31.104 attack
badbot
2019-11-22 20:58:53
51.91.159.152 attack
Nov 22 09:27:55 dedicated sshd[2727]: Invalid user sansoni from 51.91.159.152 port 39264
2019-11-22 20:51:39

Recently Reported IPs

40.51.184.7 88.141.94.254 210.167.223.164 52.30.38.108
127.105.200.31 243.14.50.85 168.223.2.163 149.5.14.172
242.41.150.217 17.201.235.153 7.13.31.251 154.194.229.216
17.50.23.49 96.19.94.239 229.62.132.169 85.108.78.168
132.69.160.189 194.89.148.180 186.135.52.81 16.192.120.130