Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Veksø

Region: Region Hovedstaden

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.146.201.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.146.201.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 11:09:48 CST 2024
;; MSG SIZE  rcvd: 107
Host info
201.201.146.94.in-addr.arpa domain name pointer 094146201201.dynamic.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.201.146.94.in-addr.arpa	name = 094146201201.dynamic.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.143.39.45 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-08-13 15:47:35
95.169.213.76 attackbots
Automatic report - Banned IP Access
2019-08-13 15:57:31
149.202.93.130 attack
Brute forcing Wordpress login
2019-08-13 15:03:39
99.254.233.250 attackspambots
Brute forcing Wordpress login
2019-08-13 15:13:21
160.16.200.204 attackspam
Brute forcing Wordpress login
2019-08-13 15:01:31
105.154.192.97 attackbotsspam
Brute forcing Wordpress login
2019-08-13 15:10:22
82.223.98.57 attackbotsspam
Brute forcing Wordpress login
2019-08-13 15:18:35
35.247.160.119 attack
Brute forcing Wordpress login
2019-08-13 15:34:42
185.207.136.33 attackspambots
Brute forcing Wordpress login
2019-08-13 14:53:11
188.48.175.34 attackspambots
Brute forcing Wordpress login
2019-08-13 14:52:18
52.192.117.64 attackbots
Brute forcing Wordpress login
2019-08-13 15:26:01
124.239.196.154 attackspambots
Aug 13 09:35:19 pornomens sshd\[25373\]: Invalid user server from 124.239.196.154 port 54796
Aug 13 09:35:19 pornomens sshd\[25373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.196.154
Aug 13 09:35:21 pornomens sshd\[25373\]: Failed password for invalid user server from 124.239.196.154 port 54796 ssh2
...
2019-08-13 15:38:26
193.70.81.208 attack
Brute forcing Wordpress login
2019-08-13 14:50:57
106.12.98.12 attack
Aug 13 07:30:28 ip-172-31-1-72 sshd\[12961\]: Invalid user brady from 106.12.98.12
Aug 13 07:30:28 ip-172-31-1-72 sshd\[12961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12
Aug 13 07:30:29 ip-172-31-1-72 sshd\[12961\]: Failed password for invalid user brady from 106.12.98.12 port 51020 ssh2
Aug 13 07:34:04 ip-172-31-1-72 sshd\[12994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.12  user=root
Aug 13 07:34:06 ip-172-31-1-72 sshd\[12994\]: Failed password for root from 106.12.98.12 port 48430 ssh2
2019-08-13 15:56:47
45.32.99.23 attackbots
Brute forcing Wordpress login
2019-08-13 15:30:56

Recently Reported IPs

126.68.144.140 187.159.194.156 189.114.126.164 227.104.102.60
199.192.174.140 207.55.60.75 149.48.45.71 206.28.140.201
121.178.162.100 8.222.234.248 51.75.242.94 232.86.8.251
12.160.150.177 237.94.158.188 20.20.234.26 164.157.159.163
141.176.24.60 121.181.221.250 195.55.193.86 142.119.34.155