Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vila Nova de Gaia

Region: Porto

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.132.176.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.132.176.242.			IN	A

;; AUTHORITY SECTION:
.			127	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040601 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 05:58:13 CST 2020
;; MSG SIZE  rcvd: 118
Host info
242.176.132.94.in-addr.arpa domain name pointer a94-132-176-242.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.176.132.94.in-addr.arpa	name = a94-132-176-242.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.95.168.111 attack
Unauthorized connection attempt from IP address 45.95.168.111 on Port 25(SMTP)
2020-03-04 17:21:49
177.207.249.96 attackspambots
2020-03-04T04:56:01.670903beta postfix/smtpd[31478]: warning: 177.207.249.96.static.gvt.net.br[177.207.249.96]: SASL LOGIN authentication failed: authentication failure
2020-03-04T04:56:04.941014beta postfix/smtpd[31478]: warning: 177.207.249.96.static.gvt.net.br[177.207.249.96]: SASL LOGIN authentication failed: authentication failure
2020-03-04T04:56:08.184602beta postfix/smtpd[31478]: warning: 177.207.249.96.static.gvt.net.br[177.207.249.96]: SASL LOGIN authentication failed: authentication failure
...
2020-03-04 16:49:57
102.42.237.185 attackbotsspam
Mar  4 05:55:28 ns382633 sshd\[7808\]: Invalid user admin from 102.42.237.185 port 49076
Mar  4 05:55:28 ns382633 sshd\[7808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.42.237.185
Mar  4 05:55:30 ns382633 sshd\[7808\]: Failed password for invalid user admin from 102.42.237.185 port 49076 ssh2
Mar  4 05:55:33 ns382633 sshd\[7814\]: Invalid user admin from 102.42.237.185 port 49081
Mar  4 05:55:33 ns382633 sshd\[7814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.42.237.185
2020-03-04 17:11:50
92.63.194.240 attackspam
RDP brute force attack detected by fail2ban
2020-03-04 17:24:34
119.28.133.210 attackspambots
Mar  4 00:28:23 pixelmemory sshd[27540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.133.210
Mar  4 00:28:25 pixelmemory sshd[27540]: Failed password for invalid user postgres from 119.28.133.210 port 42542 ssh2
Mar  4 00:32:26 pixelmemory sshd[28248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.133.210
...
2020-03-04 16:43:22
106.75.7.70 attack
Mar  4 10:02:23 nextcloud sshd\[1704\]: Invalid user user1 from 106.75.7.70
Mar  4 10:02:23 nextcloud sshd\[1704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.7.70
Mar  4 10:02:24 nextcloud sshd\[1704\]: Failed password for invalid user user1 from 106.75.7.70 port 57616 ssh2
2020-03-04 17:05:06
89.248.160.150 attackspambots
Mar  4 09:35:44 debian-2gb-nbg1-2 kernel: \[5570119.890887\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.150 DST=195.201.40.59 LEN=57 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=34433 DPT=2222 LEN=37
2020-03-04 17:01:29
96.47.10.53 attack
Mar  4 09:08:13 ArkNodeAT sshd\[7271\]: Invalid user piotr from 96.47.10.53
Mar  4 09:08:13 ArkNodeAT sshd\[7271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.47.10.53
Mar  4 09:08:15 ArkNodeAT sshd\[7271\]: Failed password for invalid user piotr from 96.47.10.53 port 47948 ssh2
2020-03-04 16:53:18
13.94.205.37 attackspambots
Mar  4 08:45:56 lnxweb62 sshd[27684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.205.37
Mar  4 08:45:58 lnxweb62 sshd[27684]: Failed password for invalid user ftpuser from 13.94.205.37 port 33982 ssh2
Mar  4 08:49:38 lnxweb62 sshd[28853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.94.205.37
2020-03-04 17:12:50
84.205.235.9 attack
spam
2020-03-04 17:06:00
122.51.242.129 attackspambots
Mar  4 11:23:17 gw1 sshd[28785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.242.129
Mar  4 11:23:19 gw1 sshd[28785]: Failed password for invalid user jomar from 122.51.242.129 port 52596 ssh2
...
2020-03-04 17:21:30
165.22.103.237 attack
Mar  4 09:09:22 vpn01 sshd[873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.103.237
Mar  4 09:09:24 vpn01 sshd[873]: Failed password for invalid user mythtv from 165.22.103.237 port 38366 ssh2
...
2020-03-04 17:09:09
189.15.207.78 attackbots
Brute force attempt
2020-03-04 17:18:35
45.95.33.244 attackspam
Mar  4 06:20:58 web01.agentur-b-2.de postfix/smtpd[78596]: NOQUEUE: reject: RCPT from unknown[45.95.33.244]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  4 06:21:06 web01.agentur-b-2.de postfix/smtpd[78598]: NOQUEUE: reject: RCPT from unknown[45.95.33.244]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  4 06:21:06 web01.agentur-b-2.de postfix/smtpd[78596]: NOQUEUE: reject: RCPT from unknown[45.95.33.244]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Mar  4 06:21:06 web01.agentur-b-2.de postfix/smtpd[74107]: NOQUEUE: reject: RCPT from unknown[45.95.33.244]: 450 4.7.1 
2020-03-04 17:07:42
149.56.142.198 attackbots
Mar  3 22:40:09 web1 sshd\[21021\]: Invalid user zhaojp from 149.56.142.198
Mar  3 22:40:09 web1 sshd\[21021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.142.198
Mar  3 22:40:11 web1 sshd\[21021\]: Failed password for invalid user zhaojp from 149.56.142.198 port 33585 ssh2
Mar  3 22:49:49 web1 sshd\[21844\]: Invalid user john from 149.56.142.198
Mar  3 22:49:49 web1 sshd\[21844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.142.198
2020-03-04 17:02:30

Recently Reported IPs

144.21.12.206 177.203.2.135 109.35.170.26 65.131.75.253
76.202.161.27 175.182.11.93 110.206.140.173 220.13.24.37
86.170.208.191 76.226.166.22 92.242.38.159 197.63.38.132
102.126.224.85 88.157.59.170 81.173.85.95 107.179.3.101
109.228.147.93 128.171.63.180 178.137.83.98 125.99.156.210