Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.145.111.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.145.111.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 00:02:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
20.111.145.94.in-addr.arpa domain name pointer 094145111020.dynamic.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.111.145.94.in-addr.arpa	name = 094145111020.dynamic.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.90.156.253 attackspambots
Automatic report - Port Scan
2020-01-13 22:00:57
41.76.169.43 attackspam
Jan 13 13:06:39 124388 sshd[22350]: Invalid user pgadmin from 41.76.169.43 port 55250
Jan 13 13:06:39 124388 sshd[22350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.76.169.43
Jan 13 13:06:39 124388 sshd[22350]: Invalid user pgadmin from 41.76.169.43 port 55250
Jan 13 13:06:42 124388 sshd[22350]: Failed password for invalid user pgadmin from 41.76.169.43 port 55250 ssh2
Jan 13 13:09:35 124388 sshd[22419]: Invalid user train10 from 41.76.169.43 port 49982
2020-01-13 21:37:08
190.145.118.122 attackspam
Shenzhen TVT Digital Technology API OS command injection attempt
2020-01-13 21:46:35
1.55.19.123 attack
1,32-11/03 [bc01/m43] PostRequest-Spammer scoring: Dodoma
2020-01-13 22:01:29
185.176.27.14 attackbotsspam
Jan 13 14:37:48 debian-2gb-nbg1-2 kernel: \[1181971.100561\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=10432 PROTO=TCP SPT=48165 DPT=13696 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-13 21:43:58
105.235.139.73 attackspam
scum from ALGERIA port scans attempt to login admin..
2020-01-13 21:29:32
222.186.30.114 attackspam
Jan 13 10:23:17 server sshd\[5311\]: Failed password for root from 222.186.30.114 port 26117 ssh2
Jan 13 16:34:11 server sshd\[1883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.114  user=root
Jan 13 16:34:13 server sshd\[1883\]: Failed password for root from 222.186.30.114 port 63288 ssh2
Jan 13 16:34:15 server sshd\[1883\]: Failed password for root from 222.186.30.114 port 63288 ssh2
Jan 13 16:34:17 server sshd\[1883\]: Failed password for root from 222.186.30.114 port 63288 ssh2
...
2020-01-13 21:43:12
205.185.113.104 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 21:54:04
129.208.211.22 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 21:56:11
114.119.141.170 attackspam
badbot
2020-01-13 21:35:37
184.65.90.67 attackspambots
Unauthorized connection attempt detected from IP address 184.65.90.67 to port 83 [J]
2020-01-13 21:55:24
181.57.2.98 attackbotsspam
Unauthorized connection attempt detected from IP address 181.57.2.98 to port 2220 [J]
2020-01-13 21:57:23
200.58.80.116 attack
Honeypot attack, port: 445, PTR: static-200-58-80-116.supernet.com.bo.
2020-01-13 21:27:26
222.186.180.8 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Failed password for root from 222.186.180.8 port 35502 ssh2
Failed password for root from 222.186.180.8 port 35502 ssh2
Failed password for root from 222.186.180.8 port 35502 ssh2
Failed password for root from 222.186.180.8 port 35502 ssh2
2020-01-13 21:24:35
167.114.118.135 attackbots
Jan 13 14:09:21 wordpress wordpress(www.ruhnke.cloud)[97618]: Blocked authentication attempt for admin from ::ffff:167.114.118.135
2020-01-13 21:50:11

Recently Reported IPs

175.195.200.200 132.87.96.115 204.128.181.179 227.59.154.40
170.205.131.208 72.15.240.250 98.150.80.219 61.96.193.44
211.240.242.2 59.218.200.244 212.196.69.81 163.57.81.115
236.17.72.33 66.249.233.86 64.32.131.251 2.16.198.220
52.180.19.41 230.204.132.235 79.216.143.165 193.141.35.61