Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.146.149.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.146.149.107.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 18:16:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 107.149.146.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.149.146.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
145.239.29.217 attackbots
145.239.29.217 - - \[30/Aug/2020:10:07:46 +0200\] "POST /wp-login.php HTTP/1.0" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - \[30/Aug/2020:10:07:47 +0200\] "POST /wp-login.php HTTP/1.0" 200 5607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
145.239.29.217 - - \[30/Aug/2020:10:07:49 +0200\] "POST /wp-login.php HTTP/1.0" 200 5593 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-30 16:48:44
122.152.195.84 attackbotsspam
Invalid user lwy from 122.152.195.84 port 52952
2020-08-30 16:52:42
203.218.170.101 attack
Attempted connection to port 5555.
2020-08-30 17:03:02
222.186.180.147 attackspambots
2020-08-30T11:55:17.024917snf-827550 sshd[23445]: Failed password for root from 222.186.180.147 port 4304 ssh2
2020-08-30T11:55:22.989904snf-827550 sshd[23445]: Failed password for root from 222.186.180.147 port 4304 ssh2
2020-08-30T11:55:26.520921snf-827550 sshd[23445]: Failed password for root from 222.186.180.147 port 4304 ssh2
...
2020-08-30 17:04:38
54.149.84.83 attackspam
Fail2Ban Ban Triggered
2020-08-30 16:58:48
46.26.0.34 attack
20/8/30@02:43:44: FAIL: Alarm-Network address from=46.26.0.34
20/8/30@02:43:44: FAIL: Alarm-Network address from=46.26.0.34
...
2020-08-30 16:40:16
192.210.192.165 attackspambots
Aug 30 04:41:03 Host-KEWR-E sshd[13466]: Disconnected from invalid user cai 192.210.192.165 port 55388 [preauth]
...
2020-08-30 16:50:36
181.177.14.15 attack
Attempted connection to port 445.
2020-08-30 17:06:15
58.65.136.170 attack
Aug 30 04:30:27 NPSTNNYC01T sshd[13886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.65.136.170
Aug 30 04:30:28 NPSTNNYC01T sshd[13886]: Failed password for invalid user test from 58.65.136.170 port 35867 ssh2
Aug 30 04:34:38 NPSTNNYC01T sshd[18947]: Failed password for root from 58.65.136.170 port 14176 ssh2
...
2020-08-30 16:41:56
177.68.200.31 attackbots
DATE:2020-08-30 05:45:26, IP:177.68.200.31, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-30 16:50:56
177.91.184.169 attack
Attempted Brute Force (dovecot)
2020-08-30 16:42:15
84.184.85.115 attack
Aug 30 05:46:01 ns382633 sshd\[20536\]: Invalid user pi from 84.184.85.115 port 51114
Aug 30 05:46:01 ns382633 sshd\[20536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.184.85.115
Aug 30 05:46:01 ns382633 sshd\[20538\]: Invalid user pi from 84.184.85.115 port 51116
Aug 30 05:46:01 ns382633 sshd\[20538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.184.85.115
Aug 30 05:46:03 ns382633 sshd\[20536\]: Failed password for invalid user pi from 84.184.85.115 port 51114 ssh2
2020-08-30 16:53:06
117.97.142.211 attack
Attempted connection to port 81.
2020-08-30 17:08:07
162.144.141.141 attack
162.144.141.141 - - \[30/Aug/2020:05:45:43 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.144.141.141 - - \[30/Aug/2020:05:45:46 +0200\] "POST /wp-login.php HTTP/1.0" 200 6642 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.144.141.141 - - \[30/Aug/2020:05:45:55 +0200\] "POST /wp-login.php HTTP/1.0" 200 6639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-30 17:00:52
112.85.42.186 attackspam
Aug 30 14:03:03 dhoomketu sshd[2758466]: Failed password for root from 112.85.42.186 port 41790 ssh2
Aug 30 14:03:56 dhoomketu sshd[2758490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Aug 30 14:03:58 dhoomketu sshd[2758490]: Failed password for root from 112.85.42.186 port 14912 ssh2
Aug 30 14:04:57 dhoomketu sshd[2758494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186  user=root
Aug 30 14:04:59 dhoomketu sshd[2758494]: Failed password for root from 112.85.42.186 port 41511 ssh2
...
2020-08-30 16:37:46

Recently Reported IPs

21.180.224.211 215.206.72.43 94.108.186.177 217.173.127.189
217.81.136.22 52.233.3.250 242.5.36.195 23.9.219.118
31.113.9.180 170.181.79.5 241.39.112.161 37.48.2.21
127.108.3.67 36.60.137.239 17.209.158.253 170.21.105.65
81.242.197.126 74.162.23.63 200.79.212.211 120.94.149.172