Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.11.4-P2-RedHat-9.11.4-9.P2.el7 <<>> 94.149.83.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.149.83.121.			IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112002 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Thu Nov 21 03:28:23 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 121.83.149.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.83.149.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.236.1.18 attack
ignoring robots.txt
2019-12-28 07:54:58
141.98.80.173 attackspam
k+ssh-bruteforce
2019-12-28 07:46:49
212.237.4.147 attackbots
firewall-block, port(s): 22/tcp
2019-12-28 07:35:57
145.255.31.52 attack
Dec 27 19:01:54 plusreed sshd[11336]: Invalid user uf from 145.255.31.52
...
2019-12-28 08:09:50
124.156.105.251 attackspambots
Invalid user krumeich from 124.156.105.251 port 35640
2019-12-28 08:10:17
61.156.32.184 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 07:47:36
106.13.23.105 attackspambots
Dec 28 00:17:27 localhost sshd\[2461\]: Invalid user admin from 106.13.23.105 port 49488
Dec 28 00:17:27 localhost sshd\[2461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.105
Dec 28 00:17:29 localhost sshd\[2461\]: Failed password for invalid user admin from 106.13.23.105 port 49488 ssh2
2019-12-28 07:37:59
151.217.111.81 attackbotsspam
Fail2Ban Ban Triggered
2019-12-28 08:06:26
63.41.36.220 attackbotsspam
Automatic report - Banned IP Access
2019-12-28 08:11:53
160.16.121.111 attackspambots
Dec 28 00:20:11 dedicated sshd[18919]: Invalid user vroot from 160.16.121.111 port 46818
2019-12-28 07:37:10
183.166.171.134 attack
2019-12-27T23:55:39.167791 X postfix/smtpd[19310]: lost connection after AUTH from unknown[183.166.171.134]
2019-12-27T23:55:40.493571 X postfix/smtpd[19306]: lost connection after AUTH from unknown[183.166.171.134]
2019-12-27T23:55:41.691790 X postfix/smtpd[17097]: lost connection after AUTH from unknown[183.166.171.134]
2019-12-27T23:55:41.829293 X postfix/smtpd[17319]: lost connection after AUTH from unknown[183.166.171.134]
2019-12-28 07:53:12
134.175.124.221 attack
$f2bV_matches
2019-12-28 08:04:12
173.255.217.203 attackspam
Exploid host for vulnerabilities on 27-12-2019 22:55:13.
2019-12-28 08:08:16
125.19.186.6 attackbots
Port scan on 9 port(s): 3390 3392 3395 3398 3399 3401 4321 23000 53389
2019-12-28 07:40:29
182.61.37.35 attackspambots
Dec 27 17:56:06 plusreed sshd[26805]: Invalid user qwerty@111 from 182.61.37.35
...
2019-12-28 07:38:11

Recently Reported IPs

58.92.205.182 62.131.54.173 133.207.162.56 192.56.252.86
131.174.71.174 121.123.80.12 12.92.233.243 123.153.5.33
75.206.101.160 129.116.74.5 204.232.183.142 56.129.55.99
8.213.201.132 51.154.126.229 82.2.183.97 190.215.98.20
89.115.160.35 98.110.67.19 196.46.141.70 142.199.52.106