Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lisbon

Region: Lisboa

Country: Portugal

Internet Service Provider: NOS

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.133.45.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.133.45.197.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 23 10:53:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
197.45.133.94.in-addr.arpa domain name pointer a94-133-45-197.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.45.133.94.in-addr.arpa	name = a94-133-45-197.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.175.253.116 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-30 17:48:58
94.176.77.82 attackspambots
Unauthorised access (Jun 30) SRC=94.176.77.82 LEN=40 TTL=244 ID=1637 DF TCP DPT=23 WINDOW=14600 SYN 
Unauthorised access (Jun 30) SRC=94.176.77.82 LEN=40 TTL=244 ID=1363 DF TCP DPT=23 WINDOW=14600 SYN 
Unauthorised access (Jun 30) SRC=94.176.77.82 LEN=40 TTL=244 ID=45344 DF TCP DPT=23 WINDOW=14600 SYN 
Unauthorised access (Jun 30) SRC=94.176.77.82 LEN=40 TTL=244 ID=6802 DF TCP DPT=23 WINDOW=14600 SYN
2019-06-30 17:34:03
121.157.229.23 attack
Jun 30 08:07:03 MK-Soft-Root2 sshd\[30244\]: Invalid user planeacion from 121.157.229.23 port 52702
Jun 30 08:07:03 MK-Soft-Root2 sshd\[30244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.157.229.23
Jun 30 08:07:05 MK-Soft-Root2 sshd\[30244\]: Failed password for invalid user planeacion from 121.157.229.23 port 52702 ssh2
...
2019-06-30 18:28:52
82.239.89.166 attackspam
$f2bV_matches
2019-06-30 18:05:05
186.216.153.187 attackspam
SMTP-sasl brute force
...
2019-06-30 18:02:44
181.48.28.13 attack
Jun 30 06:09:31 SilenceServices sshd[18406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
Jun 30 06:09:33 SilenceServices sshd[18406]: Failed password for invalid user bie from 181.48.28.13 port 54766 ssh2
Jun 30 06:11:12 SilenceServices sshd[19403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13
2019-06-30 18:06:32
115.47.146.216 attackbots
Jun 30 11:27:56 mail sshd\[21036\]: Invalid user server from 115.47.146.216 port 52183
Jun 30 11:27:56 mail sshd\[21036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.47.146.216
Jun 30 11:27:58 mail sshd\[21036\]: Failed password for invalid user server from 115.47.146.216 port 52183 ssh2
Jun 30 11:32:13 mail sshd\[21763\]: Invalid user regi from 115.47.146.216 port 42661
Jun 30 11:32:13 mail sshd\[21763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.47.146.216
2019-06-30 17:45:59
182.254.195.94 attackspam
Jun 30 06:54:55 ns37 sshd[27305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.195.94
Jun 30 06:54:57 ns37 sshd[27305]: Failed password for invalid user qin from 182.254.195.94 port 34468 ssh2
Jun 30 06:58:18 ns37 sshd[27501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.195.94
2019-06-30 18:24:21
220.164.193.238 attack
Jun 29 22:35:18 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=, method=PLAIN, rip=220.164.193.238, lip=[munged], TLS: Disconnected
2019-06-30 18:21:49
58.45.31.54 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-30 17:48:12
83.110.207.202 attackspam
Honeypot attack, port: 23, PTR: bba420318.alshamil.net.ae.
2019-06-30 17:50:58
165.22.251.129 attack
Jun 30 10:22:59 unicornsoft sshd\[16649\]: User root from 165.22.251.129 not allowed because not listed in AllowUsers
Jun 30 10:22:59 unicornsoft sshd\[16649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.129  user=root
Jun 30 10:23:01 unicornsoft sshd\[16649\]: Failed password for invalid user root from 165.22.251.129 port 45304 ssh2
2019-06-30 18:28:29
185.153.196.191 attack
Multiport scan : 14 ports scanned 11141 13908 13950 14004 15188 15219 15568 16217 16836 17922 18018 18242 18434 18978
2019-06-30 18:25:32
45.248.27.23 attackbots
Jun 30 09:21:21 mail sshd[12025]: Invalid user hadoop from 45.248.27.23
Jun 30 09:21:21 mail sshd[12025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.27.23
Jun 30 09:21:21 mail sshd[12025]: Invalid user hadoop from 45.248.27.23
Jun 30 09:21:23 mail sshd[12025]: Failed password for invalid user hadoop from 45.248.27.23 port 38750 ssh2
...
2019-06-30 18:21:19
164.132.197.108 attackbots
$f2bV_matches
2019-06-30 18:16:05

Recently Reported IPs

238.178.105.103 42.221.66.23 32.83.0.2 209.51.188.20
245.29.35.251 122.153.161.57 24.65.215.26 168.81.51.59
241.239.62.193 233.61.118.234 243.123.62.11 229.194.200.101
13.9.222.155 78.229.130.204 192.154.154.165 228.195.107.6
157.187.170.151 154.9.82.21 74.112.157.200 114.141.229.63