Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.150.68.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.150.68.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 07:06:40 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 4.68.150.94.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 4.68.150.94.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.186.149.66 attackspambots
Unauthorized connection attempt from IP address 115.186.149.66 on Port 445(SMB)
2020-02-19 07:11:49
191.55.139.49 attackbots
Unauthorized connection attempt from IP address 191.55.139.49 on Port 445(SMB)
2020-02-19 07:13:34
195.84.49.20 attackspam
Feb 18 17:56:09 ny01 sshd[23083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.84.49.20
Feb 18 17:56:11 ny01 sshd[23083]: Failed password for invalid user mapred from 195.84.49.20 port 46484 ssh2
Feb 18 17:58:57 ny01 sshd[24334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.84.49.20
2020-02-19 06:59:11
113.200.58.178 attackbots
Feb 18 23:01:43 MK-Soft-Root2 sshd[27528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.58.178 
Feb 18 23:01:45 MK-Soft-Root2 sshd[27528]: Failed password for invalid user tmpu1 from 113.200.58.178 port 62915 ssh2
...
2020-02-19 07:07:13
122.166.227.27 attack
Feb 18 22:57:37 legacy sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.227.27
Feb 18 22:57:39 legacy sshd[2304]: Failed password for invalid user fahad from 122.166.227.27 port 58622 ssh2
Feb 18 23:01:38 legacy sshd[2343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.166.227.27
...
2020-02-19 07:11:26
220.173.55.8 attack
Feb 18 20:02:19 firewall sshd[12949]: Invalid user pi from 220.173.55.8
Feb 18 20:02:22 firewall sshd[12949]: Failed password for invalid user pi from 220.173.55.8 port 15282 ssh2
Feb 18 20:04:48 firewall sshd[13063]: Invalid user tmpu from 220.173.55.8
...
2020-02-19 07:09:58
94.25.184.106 attackbotsspam
Unauthorized connection attempt from IP address 94.25.184.106 on Port 445(SMB)
2020-02-19 07:10:22
78.140.40.45 attack
Unauthorized connection attempt from IP address 78.140.40.45 on Port 445(SMB)
2020-02-19 07:12:39
118.173.238.213 attack
Unauthorized connection attempt from IP address 118.173.238.213 on Port 445(SMB)
2020-02-19 07:23:26
111.231.75.5 attack
Invalid user tsbot from 111.231.75.5 port 44454
2020-02-19 07:36:49
182.99.52.149 attackspam
Port 1433 Scan
2020-02-19 07:36:10
49.88.112.55 attack
Feb 18 13:18:51 hanapaa sshd\[26650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Feb 18 13:18:53 hanapaa sshd\[26650\]: Failed password for root from 49.88.112.55 port 9623 ssh2
Feb 18 13:19:16 hanapaa sshd\[26699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Feb 18 13:19:17 hanapaa sshd\[26699\]: Failed password for root from 49.88.112.55 port 47832 ssh2
Feb 18 13:19:35 hanapaa sshd\[26717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-02-19 07:21:53
144.22.108.33 attackspambots
Feb 18 11:55:01 : SSH login attempts with invalid user
2020-02-19 07:29:03
78.128.113.91 attackspambots
2020-02-19 00:09:59 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin999\)
2020-02-19 00:12:26 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin3@no-server.de\)
2020-02-19 00:12:33 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin3\)
2020-02-19 00:16:02 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin2014@no-server.de\)
2020-02-19 00:16:10 dovecot_plain authenticator failed for \(ip-113-91.4vendeta.com.\) \[78.128.113.91\]: 535 Incorrect authentication data \(set_id=admin2014\)
...
2020-02-19 07:24:36
211.254.214.150 attackbotsspam
Feb 18 22:54:23 Ubuntu-1404-trusty-64-minimal sshd\[3638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.214.150  user=uucp
Feb 18 22:54:26 Ubuntu-1404-trusty-64-minimal sshd\[3638\]: Failed password for uucp from 211.254.214.150 port 58420 ssh2
Feb 18 23:01:42 Ubuntu-1404-trusty-64-minimal sshd\[11110\]: Invalid user zanron from 211.254.214.150
Feb 18 23:01:42 Ubuntu-1404-trusty-64-minimal sshd\[11110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.214.150
Feb 18 23:01:44 Ubuntu-1404-trusty-64-minimal sshd\[11110\]: Failed password for invalid user zanron from 211.254.214.150 port 45928 ssh2
2020-02-19 07:06:30

Recently Reported IPs

162.254.73.188 34.154.53.190 126.78.32.237 47.212.140.161
45.80.178.125 47.198.26.115 121.133.146.144 84.40.248.46
176.245.115.241 162.187.113.80 138.155.43.156 229.104.205.126
242.241.62.79 249.44.179.211 210.65.200.249 30.232.128.29
153.14.152.126 121.169.224.141 131.4.81.135 250.104.29.59