Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Slovakia (SLOVAK Republic)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
94.136.157.114 attack
Dovecot Invalid User Login Attempt.
2020-08-27 15:32:50
94.136.157.114 attackspam
Dovecot Invalid User Login Attempt.
2020-07-18 12:06:14
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.136.157.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.136.157.85.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:26:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 85.157.136.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.157.136.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.58.212.108 attackspam
2020-08-09T10:00:05.265435correo.[domain] sshd[35828]: Failed password for root from 121.58.212.108 port 56655 ssh2 2020-08-09T10:01:05.846286correo.[domain] sshd[36076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.58.212.108 user=root 2020-08-09T10:01:08.041564correo.[domain] sshd[36076]: Failed password for root from 121.58.212.108 port 33531 ssh2 ...
2020-08-10 07:09:03
45.236.128.93 attackspam
Automatic report - Banned IP Access
2020-08-10 07:03:26
222.186.42.213 attackbots
Aug 10 00:44:33 vmanager6029 sshd\[28310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
Aug 10 00:44:35 vmanager6029 sshd\[28308\]: error: PAM: Authentication failure for root from 222.186.42.213
Aug 10 00:44:36 vmanager6029 sshd\[28311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213  user=root
2020-08-10 06:45:27
212.70.149.82 attackspambots
(smtpauth) Failed SMTP AUTH login from 212.70.149.82 (BG/Bulgaria/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-10 03:07:34 login authenticator failed for (User) [212.70.149.82]: 535 Incorrect authentication data (set_id=aster@farasunict.com)
2020-08-10 06:45:41
87.246.7.36 attackspambots
Aug 10 00:50:08 relay postfix/smtpd\[12604\]: warning: unknown\[87.246.7.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 00:50:30 relay postfix/smtpd\[13550\]: warning: unknown\[87.246.7.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 00:50:36 relay postfix/smtpd\[12604\]: warning: unknown\[87.246.7.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 00:50:46 relay postfix/smtpd\[11416\]: warning: unknown\[87.246.7.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 10 00:51:08 relay postfix/smtpd\[12604\]: warning: unknown\[87.246.7.36\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-10 07:07:34
104.236.247.64 attackbots
Aug1000:15:04server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:14:58server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:56server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:50server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:45server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:20:09server4pure-ftpd:\(\?@68.183.58.220\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:15:13server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:20:14server4pure-ftpd:\(\?@68.183.58.220\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:38server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:15:09server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]IPAddressesBlocked:68.66.224.3\(US/UnitedStates/az1-ss2.a2hosting.com\)
2020-08-10 06:54:52
94.156.175.181 attack
MYH,DEF GET /OLD/wp-admin/
2020-08-10 07:00:36
41.78.75.45 attackbots
Aug  9 16:57:13 Tower sshd[37912]: Connection from 41.78.75.45 port 19230 on 192.168.10.220 port 22 rdomain ""
Aug  9 16:57:15 Tower sshd[37912]: Failed password for root from 41.78.75.45 port 19230 ssh2
Aug  9 16:57:15 Tower sshd[37912]: Received disconnect from 41.78.75.45 port 19230:11: Bye Bye [preauth]
Aug  9 16:57:15 Tower sshd[37912]: Disconnected from authenticating user root 41.78.75.45 port 19230 [preauth]
2020-08-10 06:34:46
120.210.134.49 attack
Aug 10 01:22:13 gw1 sshd[15227]: Failed password for root from 120.210.134.49 port 57600 ssh2
...
2020-08-10 06:36:00
23.100.106.135 attackbots
 TCP (SYN) 23.100.106.135:54821 -> port 31146, len 44
2020-08-10 06:56:05
178.128.41.141 attackspambots
Aug  9 16:40:41 lanister sshd[24423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Aug  9 16:40:43 lanister sshd[24423]: Failed password for root from 178.128.41.141 port 57894 ssh2
Aug  9 16:43:04 lanister sshd[24431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Aug  9 16:43:06 lanister sshd[24431]: Failed password for root from 178.128.41.141 port 44860 ssh2
2020-08-10 07:05:11
190.104.235.8 attackspambots
prod8
...
2020-08-10 06:52:56
114.32.239.219 attack
Sent packet to closed port: 9530
2020-08-10 06:42:38
128.199.121.32 attackbots
Failed password for root from 128.199.121.32 port 58750 ssh2
2020-08-10 06:55:12
173.165.132.138 attackspambots
$f2bV_matches
2020-08-10 06:40:30

Recently Reported IPs

123.194.118.161 124.244.17.7 190.120.61.42 102.39.165.167
221.157.125.2 111.240.139.187 1.117.80.232 49.204.190.17
49.229.32.173 190.180.154.210 61.186.56.129 81.163.8.84
165.231.130.216 177.222.22.29 187.245.134.47 201.19.226.67
179.107.11.135 106.47.106.209 119.148.18.157 46.146.209.132