Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Berlin

Region: Berlin

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.134.221.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.134.221.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 06 23:30:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
8.221.134.94.in-addr.arpa domain name pointer i5E86DD8.versanet.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.221.134.94.in-addr.arpa	name = i5E86DD8.versanet.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
82.221.105.6 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-06 13:57:31
198.20.87.98 attack
" "
2020-02-06 13:51:50
222.186.15.10 attackspambots
2020-02-06T07:14:18.006362scmdmz1 sshd[12795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-02-06T07:14:20.017071scmdmz1 sshd[12795]: Failed password for root from 222.186.15.10 port 17965 ssh2
2020-02-06T07:14:23.180277scmdmz1 sshd[12795]: Failed password for root from 222.186.15.10 port 17965 ssh2
2020-02-06T07:14:18.006362scmdmz1 sshd[12795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-02-06T07:14:20.017071scmdmz1 sshd[12795]: Failed password for root from 222.186.15.10 port 17965 ssh2
2020-02-06T07:14:23.180277scmdmz1 sshd[12795]: Failed password for root from 222.186.15.10 port 17965 ssh2
2020-02-06T07:14:18.006362scmdmz1 sshd[12795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
2020-02-06T07:14:20.017071scmdmz1 sshd[12795]: Failed password for root from 222.186.15.10 port 17965 ssh2
2020-02-0
2020-02-06 14:15:29
87.14.251.1 attackspam
SSH login attempts with user root at 2020-02-05.
2020-02-06 14:15:10
92.118.160.9 attackbots
web Attack on Website at 2020-02-05.
2020-02-06 14:05:56
72.44.25.0 attackspam
web Attack on Website at 2020-02-05.
2020-02-06 14:36:28
89.248.174.2 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:10:52
106.13.96.222 attackspambots
Feb  6 06:40:09 plex sshd[14848]: Invalid user mkb from 106.13.96.222 port 38950
2020-02-06 13:53:38
58.56.33.2 attackspambots
SSH login attempts with user root at 2020-02-05.
2020-02-06 14:41:25
88.61.0.9 attackspambots
web Attack on Website at 2020-02-05.
2020-02-06 14:12:08
80.22.178.5 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:25:02
80.82.70.1 attackspam
SSH login attempts with user root at 2020-02-05.
2020-02-06 14:22:23
175.101.102.81 attackbots
1580964970 - 02/06/2020 05:56:10 Host: 175.101.102.81/175.101.102.81 Port: 445 TCP Blocked
2020-02-06 13:55:34
83.97.20.3 attackbotsspam
SSH login attempts with user root at 2020-02-05.
2020-02-06 14:18:27
77.247.108.2 attackspambots
Brute-Force on ftp at 2020-02-05.
2020-02-06 14:32:43

Recently Reported IPs

123.228.65.171 17.75.250.103 50.241.22.144 172.29.126.237
132.37.34.209 191.27.15.168 7.46.169.125 233.185.143.192
136.153.38.194 111.150.190.165 178.170.2.42 58.93.37.182
40.47.121.51 201.148.113.192 139.164.2.116 241.77.149.62
37.80.30.16 32.79.232.125 210.229.3.157 132.38.190.64